Professional Documents
Culture Documents
seo OpenServer™
Handbook
The Santa Cruz Operation, Inc. and sca Skunkware are not related to, affiliated with or licensed by the
famous Lockheed Martin Skunk Works®, the creator of the F-117 Stealth Fighter, SR-71, U-2, Venturestar™,
Darkstar ™ , and other pioneering air and spacecraft.
The sca software that accompanies this publication is commercial computer software and, together with
any related documentation, is subject to the restrictions on US Government use as set forth below. If this
procurement is for a DOD agency, the following DFAR Restricted Rights Legend applies:
RESTRICTED RIGHTS LEGEND: When licensed to a U.S., State, or Local Government, all Software
produced by sca is commercial computer software as defined in FAR 12.212, and has been developed
exclusively at private expense. All technical data, or sca commercial computer software/documentation is
subject to the provisions of FAR 12.211 - "Technical Data", and FAR 12.212 - "Computer Software"
respectively, or clauses providing sca equivalent protections in DFARS or other agency specific regulations.
Manufacturer: The Santa Cruz Operation, Inc., 400 Encinal Street, Santa Cruz, CA 95060.
The copyrighted software that accompanies this publication is licensed to the End User only for use in strict
accordance with the End User License Agreement, which should be read carefully before commencing use
of the software.
System administration
Chapter 9: Administering seQ systems ............................................ ............. 137
Chapter 10: Starti ng and stoppi ng the system ........ .... .... .. ... .... ... .. ... ..... .. ..... . 169
Chapter 11: Customizing startup of the Graphical Environment .................. 199
Chapter 12: Specifying the locale .................................................................. 221
Chapter 13: Troubleshooting system-level problems .................................... 247
Hardware configuration
Chapter 14: Basic hardware configuration .................................................... 271
Chapter 15: Adding memory and bus cards .................................................. 295
Chapter 16: Adding sesl host adapters and peripherals .............................. 303
Chapter 17: Installing Plug and Play devices ................................................ 311
Chapter 18: Adding hard disks ....................................................................... 323
Table of contents v
Chapter 19: Adding tape drives ....................................................................... 343
Chapter 20: Configuring video adapters ........................................................ 355
Chapter 21: Adding serial and parallel ports ................................................. 367
Chapter 22: Configuring audio adapters ........................................................ 379
Chapter 23: Adding mice and bitpads ............................................................ 387
Chapter 24: Adding printers ........................................................................... 397
Chapter 25: Adding modems .......................................................................... 405
Chapter 26: Adding serial terminals .............................................................. 431
Network configuration
Chapter 27: Configuring Internet services ..................................................... 453
Chapter 28: Managing virtual domains .......................................................... 473
Chapter 29: Configuring network connections .............................................. 481
vi
Introduction
About this book 3
How this book is organized .................................................................... 3
Related documentation ........................................................................... 4
Development documentation ............................................................. 7
Driver development ........................................................................... 7
Typographical conventions ..................................................................... 8
How can we improve this book? ............................................................. 9
Chapter 1
About seQ OpenServer systems 11
System configurations .......................................................................... 11
seQ OpenServer systems ............................................................... 11
Media ............................................................................................. 12
Printed documentation .................................................................... 12
Additional licenses and products ......................................................... 13
Licensing and registration terminology ............................................ 13
Accessing seQ Services information online ........................................ 14
Finding seQ training .......... .............. ............................................. ... 15
Installation and
software configuration
Chapter 2
Installing or upgrading an seQ system 19
Installation and upgrade checklist ....................................................... 20
Responding to prompts ........................................................................ 27
Installing boot-time loadable drivers .................................................... 28
Booting from CD-ROM .......................................................................... 28
The installation and upgrade procedure .............................................. 29
After installation .................................................................................... 35
Choosing an upgrade path .................................................................... 36
Chapter 3
Troubleshooting the installation 53
Solving problems during installation ................................................... 54
System does not boot during installation ......................................... 54
Error reading a floppy disk .............................................................. 55
Errors when using sesl installation devices .................................... 56
System reboots from Boot Disk or screen blanks after Boot:
prompt ........................................................................................ 56
System hangs at hardware configuration screen ............................. 57
Hardware self-check stops .............................................................. 57
System does not boot from the hard disk ........................................ 58
Solving problems after installation ...................................................... 58
Console screen looks strange ......................................................... 59
Graphical scologin screen on tty02 looks strange ............................ 59
Hardware does not work ................................................................. 59
DOS does not work ......................................................................... 60
System not licensed or unregistered software ................................. 60
Error message: Can't fork ............................................................... 60
Error message: X TOOLKIT ERROR ................................................. 60
Common system resource error messages ..................................... 61
viii
Solving undocumented installation problems ..................................... 62
Hardware and operating systems .................................................... 62
Identifying the problem .................................................................... 63
Before calling for help ........................................................................... 64
A description of the problem ........................................................... 65
System configuration ...................................................................... 65
Chapter 4
Installing and managing software components 69
The Software Manager interface ........................................................... 70
Installing software ................................................................................. 72
Loading software ............................................................................ 73
About products, components, and packages ................................... 73
Removing software ............................................................................... 74
About dependencies ....................................................................... 75
Examining software packages .............................................................. 75
Examining installed software ........................................................... 76
Examining software to be installed .................................................. 77
Verifying software ................................................................................. 77
About software patches ........................................................................ 80
Chapter 5
Creating an emergency boot floppy disk set 81
Configuring the floppy disks ................................................................ 82
Adding files to the root floppy disk ...................................................... 84
Testing your emergency boot floppy disk set ...................................... 84
Reading backups ............................................................................ 84
Emergency boot floppy set and mirrored root disks ......................... 85
Booting from the hard disk .............................................................. 86
Chapter 6
Licensing and registering SeQ products 87
The License Manager interface ............................................................. 88
Licensing products ............................................................................... 89
Table of contents ix
Licensing additional users and CPus ............................................... 90
Removing product licenses ............................................................. 90
Registering products ............................................................................ 90
Displaying login licenses in use ........................................................... 93
Troubleshooting license and registration problems ............................ 93
License Manager will not accept registration key ............................. 93
License Manager will not accept license information ....................... 93
Licensing Policy Manager Daemon (ifor_pmd) has terminated ........ 94
OpenServer license has expired ..................................................... 94
No user licenses were found on this machine .................................. 95
LOGIN: ERROR- Failed to initialize policy manager ........................ 96
Chapter 7
Using other operating systems with an seQ
system 101
Installing 05/2 or Windows NTTM partitions ........................................ 102
Creating and formatting a physical DOS partition .............................. 102
DOS partition restrictions ............................................................... 103
Using low-level format programs ................................................... 104
Converting fdisk numbers ............................................................. 104
Partitioning the hard disk using fdisk (Interactive installation) ........ 105
Displaying current partition table ................................................... 106
Switching operating systems ............................................................. 106
Booting a DOS partition ................................................................. 107
Booting an arbitrary partition ......................................................... 107
Booting DOS from a floppy disk ..................................................... 108
Installing a UNIX partition on a DOS system ....................................... 109
Using an SCO system and DOS with two hard disks .......................... 110
Removing an operating system from the hard disk ........................... 111
Managing DOS files with doscmd(C) ................................................... 111
doscmd(C) default file ................................................................... 112
Mounting DOS filesystems or partitions ............................................. 113
Accessing DOS partitions on a second disk .................................. 114
x
Using the system
Chapter 8
Using the system 117
What do I need to know? 118
Command lines, operating systems, and networks .......................... . 120
Starting the Desktop .......................................................................... . 121
Exiting the Desktop ...................................................................... . 121
Using Desktop features ................................................................ . 122
Using the mouse .......................................................................... . 123
Pressing onscreen buttons ........................................................... . 123
Using windows ............................................................................. . 124
Scrolling ........................................................................................ 125
Using menus ................................................................................ . 125
Using icons .................................................................................. . 126
An overview of the seQ Panner window manager ........................ . 127
Getting help ........................................................................................ . 127
Getting character-based help ....................................................... . 128
Sending and receiving mail ............................................................... . 129
Sending e-mail ............................................................................. . 130
Replying to e-mail ........................................................................ . 131
Saving messages ........................................................................ . 132
Deleting and restoring messages ................................................. . 132
Getting more information about Mail ............................................. . 133
System administration
Chapter 9
Administering seQ systems 137
Understanding the basics ................................................................... 137
What is system administration? ..................................................... 138
What to read if you are new .......................................................... 139
Keeping a system log .................................................................... 139
The superuser account ................................................................. 140
The keyboard ................................................................................ 140
Table of contents xi
Running programs simultaneously with multiscreen displays ......... 141
System security.......... ...... ... .... ...... ........... ...... ....... ...... ........ ......... 142
Administering your system with SCOadmin ...................................... 143
Starting SCOadmin from the command line ............................. ...... 144
About Sysadmsh Legacy .............................................................. 145
Refreshing data in the display ........... ...... ...... ...... ... ...... .... ..... .... .... 146
Using point help ............................................................................ 146
Using the toolbar ........................................................................... 146
Using SCOadmin in character mode ............................................. 146
Administering other systems with SCOadmin ................................ 149
Using the System Defaults Manager .......... ......... ....... ................... 150
Controlling processes with the Process Manager .......................... 151
Troubleshooting SCOadmin ................................ .......................... 156
Educating users .................................................................................. 159
Planning your site ............................................................................... 162
User resource considerations ........................................................ 162
Network considerations ................................................................. 163
Hardware considerations ............................................................... 163
Summary of system administration tasks .......................................... 164
Chapter 10
Starting and stopping the system 169
Starting the system ............................................................................. 169
Loading the operating system ....................................................... 170
Saving/deleting a system memory image ...................................... 170
Cleaning filesystems ..................................................................... 171
Choosing the mode of system operation ....................................... 172
Setting the time and date at startup ............................................... 173
Setting the time and date during normal operation ......................... 174
Changing the system time zone .................................................... 174
Checking the security databases ................................................... 175
Stopping the system ........................................................................... 178
Using the shutdown command line ................................................ 179
Using the haltsys command ................................... ....................... 179
Logging in as the superuser ............................................................... 180
Understanding the hardware information displayed at boot time ..... 181
xii
Changing the startup process ............................................................ 182
Changing the system restart options ............................................. 182
Changing the default bootstring (DEFBOOTSTR) ............................ 183
Booting an old kernel .................................................................... 184
Troubleshooting system startup ......................................................... 184
About missing or corrupted system files ........................................ 185
Restoring critical security database files ........................................ 186
System fails to boot or displays "NO OS' message ....................... 188
boot not found ............................................................................... 188
unix not found ................. ...................................... ........................ 189
Cannot load floating point emulator ............................................... 190
Cannot exec Ibin/login: No such file or directory............................ 191
Cannot open letc/inittab .... ............................................................ 192
letc/initscript: Ibin/sulogin: not found .............................................. 193
letc/initscript: letc/bcheckrc: not found ........................................... 193
no utmp entry. You must log in from lowest level -sh ..................... 194
Fork failed ... Resource temporarily unavailable ............................. 194
System hangs at boot time ............................................................ 195
Console keyboard locks up ........................................................... 195
Cannot log into console ................................................................. 197
Chapter 11
Customizing startup of the Graphical
Environment 199
Starting a Graphical Environment session ........................................ 199
Running scologin .......................................................................... 200
Running the startx script ............................................................... 202
Using grey-scale monochrome monitors with the X server ............ 204
Solving problems exiting the X server ........................................... 205
Using the session manager ........................................................... 205
Using environment variables .............................................................. 208
Customizing scologin ......................................................................... 210
Using the scologin administration script ......................................... 211
Configuring scologin on multiple displays ...................................... 211
About XDMCP X server options ..................................................... 212
Running scologin with XDMCP ....................................................... 213
Running scologin with the Xservers file ......................................... 214
Chapter 12
Specifying the locale 221
The International Settings Manager interface .................................... 221
Setting locales ..................................................................................... 222
Localization of system software .................................................... 223
Setting the system locale .............................................................. 223
Setting user locales ....................................................................... 224
About locales ................................................................................ 224
Setting the system keyboard .............................................................. 226
Selecting codesets .............................................................................. 227
Setting the internal system codeset ............................................... 228
Setting the console codeset .......................................................... 228
Translating files between different code sets ................................... 229
Setting device character mapping ...................................................... 230
Device mapping ............................................................................ 230
Creating a character mapping table ............................................... 232
Configuring SCOterm for European languages ............................... 235
Language behavior in SCOadmin ................................................... 236
Using mail in 8-bit (European) locales ........................................... 240
UUCP dialer scripts ....................................................................... 242
Calendars ..................................................................................... 242
Timezones .................................................................................... 243
Clients .......................................................................................... 244
Documentation and scohelp .......................................................... 244
Enabling Euro currency symbol support ........................................... 244
Setting the IS08859-15 code set .................................................... 245
Using the Euro currency symbol .................................................... 246
Printing the Euro currency symbol ................................................. 246
xiv
Chapter 13
Troubleshooting system-level problems 247
Other troubleshooting documentation ............................................... 248
Preparing to recover from problems .................................................. 248
Recording your root disk layout ..................................................... 249
Restoring a corrupted root filesystem ................................................ 250
System crashes ................................................................................... 253
Recovering from a system panic ................................................... 254
Recovering after a power failure .................................................... 256
Automatic reboot ........................................................................... 256
Analyzing system failures ................................................................... 256
Traps, faults, and exceptions ......................................................... 256
Console panic information ............................................................. 257
Getting the EIP number ................................................................. 258
Checking error messages ............................................................. 259
Checking system files with error histories ...................................... 260
Checking system configuration ...................................................... 260
Generating a system dump image with sysdump (ADM) ................ 261
Examining a memory dump with crash(ADM) .................................... 262
Studying a panic ........................................................................... 263
Additional help from seQ Support ................................................. 264
Common system-wide problems ........................................................ 264
cron, at, and batch troubleshooting ................................................... 265
cron daemon is not running .................................. ......................... 265
at command fails: cannot change mode of job ...... ......................... 266
Runaway processes ............................................................................ 267
Hardware configuration
Chapter 14
Basic hardware configuration 271
Accessing the seQ Compatible Hardware Web Pages ...................... 273
Supported architecture ....................................................................... 274
General compatibility issues .............................................................. 274
Typical device interrupts ..................................................................... 275
Configuring devices with bootstrings ................................................ 276
Table of contents xv
Using bootstrings ................................................................................ 276
Advanced Power Management bootstrings ................................... 277
QIC-02 tape drive bootstrings ........................................................ 279
SCSI peripheral bootstrings ........................................................... 280
SCSI host adapter bootstrings ....................................................... 281
Root hard disk bootstrings ............................................................ 281
Disabling drivers with bootstrings .................................................. 282
Specifying the location of an EIDE (IDE) CD-ROM ........................ 283
Memory bootstrings ...................................................................... 283
cache bootstring ........................................................................... 283
System console bootstring ............................................................ 284
Using boot-time loadable drivers ....................................................... 284
Adding BTLDs at boot time ............................................................ 285
Adding BTLDs after initial installation ............................................. 286
Configuring drivers with the Hardware/Kernel Manager .................... 286
The Hardware/Kernel Manager interface ....................................... 287
About device driver configuration .................................................. 288
Relinking the kernel ............................................................................ 290
Configuring Power Management ........................................................ 291
Configuring APM using pwrsh ........................................................ 292
Chapter 15
Adding memory and bus cards 295
Installing bus cards ............................................................................. 295
DIP switches and jumpers ............................................................. 296
Installing the hardware .................................................................. 296
Avoiding interrupt clashes on PCI/ISA bus machines ...................... 296
Using the manufacturer's setup program ....................................... 297
Adding more memory .......................................................................... 297
Memory card compatibility notes ................................................... 298
Disabled high memory on Corollary architectures .......................... 298
32-bit memory ............................................................................... 298
High-speed cache memory ................................................................. 299
Adding math coprocessors ................................................................. 299
Specific math coprocessor issues ................................................. 300
Adding an external floppy to an IBM PS/2 ........................................... 301
xvi
Chapter 16
Adding SCSI host adapters and peripherals 303
SCSI addresses .................................................................................... 304
Adding a SCSI peripheral device ......................................................... 305
Boot time messages from host adapter drivers ................................. 306
Adding SCSI/EIDE CD-ROM drives ........................................................ 307
Adding floptical drives ........................................................................ 309
Troubleshooting SCSI host adapters .................................................. 309
Installing when SCSI host adapters share interrupts ...................... 310
Mixing scatter-gather and non scatter-gather host adapters .......... 310
SCSI peripherals not recognized .................................................... 310
Chapter 17
Installing Plug and Play devices 311
The ISA PnP Configuration Manager interface ................................... 312
Physically adding an ISA PnP card ...................................................... 313
Selecting a card and device to configure ........................................... 314
Modifying resource allocation for a device ..................................... 314
Enabling BIOS resource allocation ................................................. 315
Disabling a device ......................................................................... 316
Resolving configuration conflicts ....................................................... 316
Relinking the kernel and rebooting the system ................................. 317
Troubleshooting card configuration ................................................... 318
Terminology and concepts .................................................................. 319
Plug and Play Glossary ................................................................. 319
Plug and Play files and utilities ...................................................... 320
Chapter 18
Adding hard disks 323
Supported hard disk configurations ................................................... 323
Adding secondary hard disks ............................................................. 324
Configuring a SCSI hard disk .............................................................. 325
Installing a hard disk ........................................................................... 327
Changing default disk parameters using dkinit ............................... 328
Partitioning a hard disk using fdisk ................................................ 330
Chapter 19
Adding tape drives 343
Installing a tape drive .......................................................................... 344
Installing a QIC-02 cartridge tape drive .......................................... 345
Installing an Irwin mini-cartridge tape drive .................................... 346
Installing a QIC-40/80 floppy tape drive .......................................... 347
Installing a SCSI tape drive ............................................................ 347
Installing a Compaq CPQS tape drive ............................................ 348
Changing the default tape drive .......................................................... 349
Troubleshooting tape drives ............................................................... 349
General problems with tape drives ................................................ 349
Problems with QIC-02 cartridge tape drives ................................... 350
Problems with SCSI tape drives ..................................................... 352
Problems with Irwin and QIC-40/80 tape drives .............................. 353
Chapter 20
Configuring video adapters 355
The Video Configuration Manager interface ....................................... 356
Problems exiting the Video Configuration Manager ....................... 357
xviii
Understanding video configuration .................................................... 357
Understanding resolutions ............................................................. 358
Generic driver configuration .......................................................... 358
Understanding multi-monitor configuration .................................... 359
Adding a new video adapter ............................................................... 361
Modifying monitors, resolutions, and function keys ......................... 362
Changing the configured video monitor ......................................... 363
Changing a configured resolution .................................................. 363
Adding a resolution ....................................................................... 363
Assigning function keys ................................................................. 364
Removing a video configuration ......................................................... 365
Configuring unsupported adapters ..................................................... 366
Chapter 21
Adding serial and parallel ports 367
Adding and configuring sea-supported serial cards ......................... 368
The Serial Manager interface ........................................................ 369
Configuring a serial card ............................................................... 369
Configuring a serial port ................................................................ 370
Serial ports on multi-function cards ............................................... 372
Combining single port and multiport serial cards ............................ 372
Serial cards on ISA and EISA machines ......................................... 373
Serial cards on Micro Channel Architecture machines ................... 375
Adding and configuring parallel ports ................................................ 376
Troubleshooting serial cards .............................................................. 377
Chapter 22
Configuring audio adapters 379
The Audio Configuration Manager interface ...................................... 380
About the audio subsystem ................................................................ 380
Adding and modifying audio configurations ...................................... 382
Removing adapters ............................................................................. 383
Common audio subsystem tasks ....................................................... 383
Playing sound files ........................................................................ 384
Recording sound samples ............................................................. 384
Playing audio CDs from your CD-ROM drive ................................. 384
Configuring Netscape Communicator to play sound files ............... 385
Chapter 23
Adding mice and bitpads 387
Bus mice .............................................................................................. 387
Serial mice ........................................................................................... 388
Keyboard mice .................................................................................... 388
Configuring a mouse ........................................................................... 389
Changing mouse ports .................................................................. 390
Testing a mouse ........................................................................... 390
Removing a mouse ....................................................................... 391
Changing the keyboard mouse resolution setting ............................. 391
Using a mouse ..................................................................................... 392
Using a mouse with multiscreens .................................................. 392
Using a mouse on serial terminals ................................................. 393
Sharing a mouse with several terminals ........................................ 393
Using a mouse with keyboard-based programs ............................. 393
Using the pseudo-mouse driver ..................................................... 393
Installing a bitpad ................................................................................ 394
Troubleshooting mice and bitpads ..................................................... 395
Solving slow or no response from keyboard mice .......................... 395
Chapter 24
Adding printers 397
Installing parallel and serial printers .................................................. 398
Troubleshooting printers ..................................................................... 399
Setting up RTS/CTS protocol (hardware flow control) printers ......... 401
xx
Chapter 25
Adding modems 405
Supported modems ............................................................................. 405
Installing a modem .............................................................................. 406
Choosing which serial port to use .................................................. 406
Connecting a modem to your computer ......................................... 407
The Modem Manager interface ..................................................... 408
Configuring modems ..................................................................... 409
Detecting a modem automatically ................................................. 409
Adding a modem manually ............................................................ 410
Modifying the configuration of a modem ........................................ 411
Removing a modem .... ....... ...... ...... .... ..... .... ................... ............... 411
Guidelines for non-supported modems .............................................. 412
Configuring UUCP for modems ........................................................... 414
Using dialers ....................................................................................... 414
Dialers file entries ......................................................................... 415
atdialer and dialer programs .......................................................... 416
Understanding modem commands and setup strings ... ................. 416
Creating a new atdial dialer ........................................................... 417
Creating a new dial dialer ............................................... ;.............. 419
Setting hardware flow control ............................................................. 420
Testing your modem connection ........................................................ 421
Testing whether you can dial out ................................................... 423
Testing whether you can dial in ..................................................... 424
Troubleshooting modems ................................................................... 424
Problems dialing out ...................................................................... 424
Problems dialing in ........................................................................ 427
Chapter 26
Adding serial terminals 431
Installing serial terminals ................................................................... 432
Testing a terminal connection ............................................................ 433
Changing default terminal line characteristics .................................. 436
Changing entries in /etc/gettydefs ................................................. 436
Checking terminal settings ............................................................ 437
Changing serial line operation ....................................................... 437
Setting the terminal type at login ....................................................... 439
Setting the terminal type automatically .......................................... 440
Network configuration
Chapter 27
Configuring Internet services 453
Starting the Internet Manager ............................................................. 454
Configuring network connections ...................................................... 455
Accessing the network .................................................................. 455
Configuring network cards ............................................................ 455
Using a modem to connect to the Internet ..................................... 456
Configuring Internet services ............................................................. 463
Web .............................................................................................. 464
Mail ............................................................................................... 470
FTP ............................................................................................... 471
Net ............................................................................................... 471
Security ........................................................................................ 472
Chapter 28
Managing virtual domains 473
Enabling virtual domains .................................................................... 474
Adding and deleting virtual domains ................................................. 474
Configuring services ........................................................................... 475
xxii
Configuring SYSTEM-WIDE ............................................................ 475
Configuring interfaces ................................................................... 476
Viewing properties of virtual domains ............................................... 477
Virtual domain name and DNS ....................................................... 478
Administrative users ...................................................................... 479
Configuring e-mail ......................................................................... 479
Locking and unlocking an interface ............................................... 480
Remote administration of virtual domains ......................................... 480
Chapter 29
Configuring network connections 481
The Network Configuration Manager interface .................................. 482
About network configuration .............................................................. 483
Network adapter drivers ................................................................ 483
Protocol stacks .. .. .. ....... .... .......... ............. .. .... .. ..... .. .. .. ..... .. ...... .. ... 484
Configuration parameters ................................................................... 485
Hardware configuration ................................................................. 485
Determining parameters in use ..................................................... 487
Driver configuration ..................................................................... ,. 487
Protocol stack and WAN connection configuration .......................... 488
Configuring network hardware ........................................................... 489
Configuring adapters in PCI, EISA, and MCA machines .................. 490
Configuring ISA and PCMCIA adapters ........................................... 490
Searching for adapters .................................................................. 491
Configuring protocols ......................................................................... 492
Removing a network configuration ..................................................... 494
Troubleshooting network configuration ............................................. 494
Checking physical network connections ........................................ 495
Checking for conflicts between hardware and drivers ............ ........ 495
Verifying network media connections ............................................. 496
Special considerations concerning hardware conflicts ................... 496
Interpreting ndstat{ADM) output ..................................................... 498
Backward compatibility with LLI drivers ............................................ 499
MDI functionality not available with LLI drivers ............................... 499
Using multiple protocol stacks with LLI drivers ............................... 499
Using an LLI driver with two-protocol stacks .................................. 500
Using an LLI driver with three-protocol stacks ................................ 500
xxiv
IPX/SPX configuration parameters ...................................................... 518
NVT logins ..................................................................................... 518
Internal network number ............................................................... 518
Network number ........................................................................... 519
Framing type ................................................................................. 519
NVT login banner file ..................................................................... 522
SAP reply delay ............................................................................. 522
Source routing (Token-Ring framing only) ..................................... 522
NetBloS configuration parameters ..................................................... 523
LAN Manager Client configuration parameters ................................... 524
Appendix B
SCSI host adapters 525
Appendix C
Serial adapters 527
AMI lamb serial adapter ................................................................. 527
Arnet serial adapter (MCA) ............................................................ 527
AST serial adapter ......................................................................... 527
eTe Versanet serial adapter .......................................................... 527
Digiboard serial adapter ................................................................ 528
Olivetti RS232C multiport adapter .................................................. 528
Ouadram serial adapter ................................................................ 529
Stargate serial adapters on the Apricot Oi (MeA) .......................... 529
Tandon serial adapter ................................................................... 529
Appendix D
Mice and bitpads 531
Logitech bus mouse ...................................................................... 531
Microsoft bus mouse ...................................................................... 531
Olivetti bus mouse ........................................................................ 531
Logitech serial mice ...................................................................... 531
Appendix F
Network adapters 537
Appendix G
Kernel initialization check letters 539
Appendix H
vi command summary 543
xxvi
Introduction
About this book
This book provides the information you need to get your sea OpenServer ™
system up and running. It includes installation and configuration instruc-
tions, as well as introductions to the Desktop, online documentation, system
administration, and troubleshooting.
You will find the information you need more quickly if you are familiar with:
• "How this book is organized" (this page)
• "Related documentation" (page 4)
• "Typographical conventions" (page 8)
Although we try to present information in the most useful way, you are the
ultimate judge of how well we succeed. Please let us know how we can
improve this book (page 9).
3
About this book
Related documentation
sea OpenServer systems include comprehensive documentation. Depending
on which sea OpenServer system you have, the following books are available
in online and / or printed form. Access online books on your system by
double-clicking on the Desktop Help icon. Access online books at the sea
web site at hUp: / /www.sco.com/documentation. Additional printed ver-
sions of the books are also available.
The Desktop and most sea OpenServer programs and utilities are linked to
extensive context-sensitive help (page 127), which in turn is linked to relevant
sections in the online versions of the following books.
Late News
Contains information that was obtained too late for inclusion in the docu-
mentation shipped with sea OpenServer Release 5. You can view this
document at the sea web site by following the sea OpenServer Release 5
link from hUp: / /www.sco.com/documentation.
Release Notes
Contain important late-breaking information about installation, hard-
ware requirements, and known limitations.
sea Open Server Features and Limitations
summarizes the enhancements and new features of the current release,
describes additional limitations and workarounds, and lists supported
hardware.
5
About this book
Development documentation
The sea OpenServer Development System includes extensive documentation
of application development issues and tools. Additional resources for devel-
opers are available at the sea Developer's Home Page
(http://www.sco.com/developer).
Driver development
The Consolidated Hardware and Driver Development Kit contains documen-
tation, sample drivers, and test suites for developing drivers on sea Open-
Server and UnixWare 7. You can download all packages from the sea HDK
Homepage (http://www.sco.com/hdk) or can order the CD through the stan-
dard channels. The documentation can also be viewed online at
http://uw7doc.sco.com using Netscape or another frames-aware browser;
Select "Hardware and Driver Development" from the left frame.
7
About this book
Typographical conventions
This publication presents commands, filenames, keystrokes, and other special
elements as shown here:
NOTE For answers to technical questions, please contact your software ven-
dor or your support representative. Technical Publications is not qualified
to give technical support.
To contact us, use the card at the back of this sea Open Server Handbook or
write to us at:
Technical Publications
Attn: CFT
The Santa Cruz Operation, Inc.
PO Box 1900
Santa Cruz, California 95061-9969
USA
or e-mail us at:
techpubs@sco.com or . .. uunet!sco!techpubs
Thank you.
9
About this book
System configurations
sea offers several softwareproducts (this page), media packages (page 12),
and additional documentation in printed format (page 12) which you can
combine in the way that most effectively addresses your needs.
11
About seQ OpenServer systems
Enterprise System
This product includes all the features of the Host System and com-
plete networking tools, including installation over a network,
TCP/IP (with SCo Advanced File and Print Server running over
TCP /lp), NFS, IPX/SPX, SCO Gateway for NetWare, LAN Manager
Client, Netscape Communicator TM, and the Netscape FastTrack
server. As such, it is the most powerful and versatile server in the
product line.
Desktop System
This product is designed as a single-user workstation and contains
full graphical support as well as full networking connectivity. The
Desktop System also includes Netscape Communicator.
SCO Internet FastStart
This product is an easily configured, general-purpose Internet
server. Including Netscape Communicator, Netscape FastTrack
server, the Internet Manager, enhanced PPP from Morning Star
Technologies, and SendMail, this Internet server is robust and
powerful.
Media
All SCO OpenServer products are provided on a single CD-ROM. The Boot
Disk is a 3.5-inch floppy disk. If your system supports it, you can now boot
directly from the installation CD-ROM (page 28).
Printed documentation
The Release Notes and sea Open Server Handbook are provided in printed format
with every SCO OpenServer system package. The sea Open Server Handbook is
also available online, along with many other books. Most of the online books
are available in printed format from your vendor, in two sets. Set 1 includes
all the user's and administrator's guides. Set 2 includes all the reference man-
ual pages (several volumes).
See "Related documentation" (page 4) for detailed information about the SCo
OpenServer documentation set.
NOTE Before you can use any sea product (including additional user and
epu licenses), you must license as well as install it (page 72). You will be
prompted to license all additional products during the custom(ADM) instal-
lation procedure. Certain commercial versions of sea software also require
registration. You can register a product online at the sea web site
(http://www.sco.com/register). or with the sea Registration Center.
See also:
• "Licensing and registration terminology" (this page)
• ehapter 6, "Licensing and registering sea products" (page 87)
The sea Software License is a contract that grants you rights to use sea-
supplied software. Typically, you obtain the license from your sea software
provider. It may accompany the software media, or you may acquire it online
on the World Wide Web. The license agreement accompanies all sea prod-
ucts, either as a printed booklet or on the product media (typically in a direc-
tory named /license).
You can obtain the license for some sea products interactively at sea's web-
site. Some sea products display the license agreement when you install the
product, at which time you are prompted to read and accept the terms.
13
About sea OpenServer systems
Some products (such as the Free* sea products) do not need to be registered.
See the sea Software Registration booklet provided with your sea OpenServer
system. To register an sea product, you must have:
sea System ID
A unique ID used to identify your sea OpenServer installation. It
is generated at initial system installation, and at any subsequent
low-level disk reformat. The sea System ID is displayed when
you run the License Manager (page 88).
Registration Key
A key generated by the Registration Center when you register
your sea product. You will receive one Registration Key for each
sea product (identified by its License Number) that you register.
Until you register your sea product, warning messages will be
displayed reminding you to register. Because the Registration Key
is tied to the sea System ID, you must re-register your sea prod-
ucts if you run a low-level disk reformat.
See Chapter 6, "Licensing and registering sea products" (page 87) for more
information.
* "Free" means that there is no charge to license the software for personal and non-commercial use. The
media kit has a nominal fee, and any number of users can share it. Each installation requires a unique
license.
15
About seQ OpenServer systems
19
Installing or upgrading an seQ system
• If you have just assembled your computer for the first time or are unsure
about the hardware requirements, review the manuals provided with your
computer and hard disk. In addition, run the system self-test described in
the operator's guide for your computer to detect any hardware problems.
• Read your license agreement.
See also:
• "Installing or upgrading the system from a remote host" in the Networking Guide
After installation, keep this checklist with your system log (page 139).
(Continued)
3. Keyboard language
(For example, UK English.)
4. License number
Copy answers 4, 5, and 6 from the Certificate
of License and Authenticity (COLA.) If you
are performing an Upgrade installation, you
must have the license keys for both the origi-
nal system as well as the upgrade.
5. License code
6. License data
(This field appears only during certain ins-
tallations.)
21
Installing or upgrading an seQ system
(Continued)
12. Language
If you will be running a language product
other than US English (for example, French
or German), specify it here.
(Continued)
16. Hard disk setup, second disk (page 45) o Preserve (if available)
(If applicable) o Use whole disk for UNIX
o Customized layout
o Defer
Customized layout
UNIX partition size (MB)
DOS partition size (MB)
Other partition size (MB)
boot filesystem size (MB)
swap space size (MB)
Other filesystems size (MB)
23
Installing or upgrading an seQ system
(Continued)
(Continued)
Enter the IP addresses (page 513) of the pri- Secondary nameserver address:
mary and secondary name servers. Entering
a name server creates a default
resolv.conf(SFF) file. For more information,
see Chapter 6, "Configuring the Domain
Name Service" in the Networking Guide.
25
Installing or upgrading an seQ system
(Continued)
Responding to prompts
Use these keys when responding to prompts for information during the first
section of the installation (before software loading begins):
To: Press:
Get help (Fl)
Abort the installation (F2)
Display other choices (Space)
Restore defaults (FS)
Return to the previous screen (Esc)
Exit help screen (Esc)
Move down one line 0)
Move up one line (0
Scroll up one screen (PgUp)
Scroll down one screen (PgDn)
Select or deselect multiple items in a list (Space)
Accept an item (Enter)
Accept the current configuration (Enter)
27
Installing or upgrading an seQ system
BTLDs at boot time" (page 285) to link the drivers at the first Boot: prompt.
• At the end of the installation, after the software is loaded and the kernel is
rebuilt, you see a table of the packages installed on the disk. Enter the
name of the BTLD package to install, or press (Enter) to install the default
package.
The SCO OpenServer installation CD-ROM is now bootable. This allows for a
faster installation and allows you to skip the steps which require you to insert
and load the installation boot floppy.
You can use this feature if your system BIOS supports CD-ROM as a boot
option. You cannot use this feature if your system BIOS recognizes only a
proprietary bootable CD-ROM format.
NOTE Because not all installation utilities are aware that the CD-ROM drive
is emulating the floppy drive, you might see an error message or prompt
that mistakenly refers to the floppy drive.
If you are using the boatable CD-ROM feature, assume that messages you
receive that refer to installation media pertain to the CD-ROM drive.
29
Installing or upgrading an seQ system
If you have more than one floppy disk drive, make sure the 3.5-inch drive
is the primary drive (sometimes called the boot drive). Check your com-
puter hardware manual if you are unsure which is the primary drive.
NOTE You might be able to use the new bootable CD-ROM feature of
SCO OpenServer. See "Booting from CD-ROM" (page 28) for more infor-
mation.
5. Turn on your computer (or press any key to continue from haltsys), and
wait for the Boot: prompt.
NOTE If you select the incorrect address for the CD-ROM, and another
device is actually present at that address, you cannot successfully
change to the correct address. Press (F2) to quit the installation, then
start again from the beginning.
NOTE If the "Installation Type" field reads Fresh and you cannot
highlight any other choice, your system cannot be upgraded. Complete
the "Installation and upgrade checklist" (page 20) to make sure you have
all the necessary information, then continue with a fresh installation.
See "Choosing an upgrade path" (page 36).
CAUTION Do not allocate all of the available space to the optional /u file-
I system. This will leave insufficient space for the root filesystem. If the
root file system has insufficient space, the installation will fail.
If you encounter an error at this point, reboot the system and start the in-
stallation again from the beginning. Do not attempt to move backwards
through the installation screens.
11. The badtrk(ADM) utility runs next, if you selected it. If you encounter an
error during badtrk, reboot the system and start the installation again
from the beginning.
12. The software load begins after any disk setup or badtracking. Software
load is the longest stage of the installation, but it can proceed unattended.
As the installation loads each software component onto the hard disk, you
see messages such as:
Installing: SCO UNIX System V Operating system (Ver 5.0.5E)
Installing Phase: Copying files from the media
Installation Status: Copying file
31
Installing or upgrading an seQ system
33
Installing or upgrading an seQ system
22. Create an emergency boot floppy disk set for your system.
These disks allow you to recover your root file system quickly if it becomes
so corrupted that you cannot start the system from your hard disk. See
Chapter 5, "Creating an emergency boot floppy disk set" (page 81) for
instructions. Then, test the emergency floppy disk set, and verify that you
can read the backup you made in the previous step according to the direc-
tions in "Examining the contents of a backup" in the System Administration
Guide.
23. Register your software. See Chapter 6, "Licensing and registering sea
products" (page 87). (You already licensed your system during the instal-
lation.) The system software displays frequent reminders until you regis-
ter the software you installed.
NOTE Your software generates a new sea System ID each time you do
a low-level reformat of the root hard disk. If you do a low-level refor-
mat, you must contact an sea Registration Center to obtain a new Regis-
tration Key and repeat the registration process (page 90).
After installation
The sea OpenServer system is now installed and registered. Review Chapter
2 of the Release Notes for tasks you need to complete immediately following
installation. For further information on administering the system, see the
remaining chapters in the sea Open Server Handbook (especially Chapter 3,
"Troubleshooting the installation" (page 53), Chapter 9," Administering sea
systems" (page 137), and Chapter 13, "Troubleshooting system-level prob-
lems" (page 247)). Also see the System Administration Guide.
35
Installing or upgrading an seQ system
Read this and the following sections on upgrading your system thoroughly
before beginning an upgrade installation. They describe:
• the different types of installation you can choose if you are already running
an seQ operating system
• steps you must take before or after installing the new system so that certain
components from your previous system continue to work as you expect
Also read the chapters in the Release Notes that discuss the installation.
We recommend that you use cpio(C) format for the backups (the Backup
Manager uses cpio), and that you back up one file system per tape.
If you currently run an earlier version of an seQ UNIX operating system, one
or more of the following methods are available for you to upgrade to an SCQ
OpenServer system. Read the referenced sections and the Release Notes to
decide which method works best for your system.
• Choose an Upgrade installation (page 37).
• Choose a Fresh installation, then choose the Preserve option (page 40) for
setting up your hard disk.
• Choose a Fresh installation, then run Interactive fdisk/divvy (page 41) to
recreate your current hard disk setup.
• Choose a Fresh installation, choose the Use whole disk for UNIX or Custom-
ize option (page 42) for setting up your hard disk, then restore the data
from backups.
NOTE If your system is currently running sea Internet FastStart release 1.0
or 1.1, you must select the Fresh installation type. You may select either the
Interactive fdisk/divvy (page 41) or Preserve (page 40) option for setting up
your hard disk. You cannot select the Upgrade installation type for sea
Internet FastStart release 1.0 or 1.1.
Before reinstalling your system, read the Release Notes for instructions on
how to migrate your current Internet FastStart data. This information will
help you save sendmail, ppp, and server configuration information so that
you do not need to completely reconfigure these services.
See also:
• "Issues with any upgrade" (page 43)
• "Upgrading from release 5.0" (page 48)
• "Upgrading from release 3.0" (page 52)
• "Upgrading from release 2.0" (page 52)
37
Installing or upgrading an seQ system
I licenses for both the original system and the new system you are upgrading
to. Please have this information ready before proceeding with the upgrade.
Because the default configuration for seQ OpenServer Release 5.0.6 is larger
than the default configuration for seQ OpenServer Release 5.0.0, 5.0.2, 5.0.4,
5.0.5, the root filesystem on your primary hard disk might not be large enough
to hold the upgraded system. Check the Release Notes for space requirements.
If you want to choose the Upgrade option, but your root file system will not
hold the new release, you have three options:
• Increase the size of your root file system by reconfiguring your hard disk.
• Install a larger primary disk.
CAUTION The filesystems offered during the installation for relocated com-
ponents may contain data that you do not want to disturb, such as user
accounts or DOS files installed by sea Merge. If you choose to relocate com-
ponents to such filesystems, that data is lost.
Do not rely on being able to put additional data (such as user accounts) on the
filesystems you choose for relocation. The relocation program uses nearly all
the space in the chosen filesystems, in an attempt to create free space in the
root filesystem.
39
Installing or upgrading an seQ system
Non-root file systems and non-root disks are not changed, unless you select
them to receive relocated components.
The Preserve option is available if your system has an active UNIX partition
with a clean root file system and a valid letcldefaultlfilesys (see filesys(F)). This
option retains the file system layouts from the previous installation, except for
the root filesystem. It removes everything from the root filesystem and
installs the new system, leaving all other data intact. To access the Preserve
option, press (Space) at Hard disk setup in the Preparing your disk and choos-
ing software window, then press (Space) again at Partitions & filesystems.
If the list of hard disk setup options does not include Preserve, the installation
could not find an active UNIX partition with a valid root file system and
/etc!default/filesys. To preserve your existing partitions and filesystems, see
"About the Interactive disk setup option" (this page). When using the Interac-
tive fdisk/divvy option to retain your previous hard disk layout, you must
assemble the hard disk layout information from your previous system before
beginning the new installation.
The Preserve option is also available for the second hard disk. See "Upgrad-
ing a non-primary hard disk" (page 45).
CAUTION To retain your previous partitions and divisions using the Interac-
Itive fdisk/divvy option, you must assemble the hard disk layout information
from your previous system before beginning the new installation.
The disk setup option for Interactive fdisk/divvy is available for any installa-
tion that starts as a Fresh (rather than Upgrade) installation type. Interactive
fdisk/divvy defers disk setup until the end of the installation prompts. The in-
stallation then runs the utilities fdisk(ADM) and divvy(ADM) interactively. To
retain your previous partitions and divisions on the new system, assemble the
hard disk layout information from your previous system (including any pre-
existing DOS partitions) before beginning the new installation, as follows:
1. Run fdisk and select option 1. Record the numbers of the partitions that
hold your filesystems, then exit fdisk.
2. Run divvy(ADM) for each partition.
41
Installing or upgrading an sea system
3. Copy the information from your screen into the following table:
4. Exit divvy.
5. Enter this information during the installation's fdisk and divvy sessions to
recreate your previous hard disk layout for the new installation.
To access the Interactive fdisk/divvy option, press (Space) at Hard disk setup in
the Preparing your disk and choosing software window, then press (Space)
again at Partitions & filesystems.
The Interactive fdisk/divvy option is not available for the second hard disk.
See "Upgrading a non-primary hard disk" (page 45).
Other hard disk setup options available from Partitions & filesystems (under
Hard disk setup) are Use whole disk for UNIX and Customize. The Use whole
disk for UNIX option clears any existing partitions and divisions from your
hard disk and creates a default UNIX partition and division, which you cannot
modify. The Customize option clears any existing partitions and divisions
and creates the same default layout, then allows you to modify it with new
partitions and divisions. (The Interactive fdisk/divvy option gives you more
precise control over the size and location of partitions and divisions, but the
Customize option is simpler.) Neither of these options preserves previous
data or disk setups. If you select the Use whole disk for UNIX or Customize
option, you must restore any previous data from backups after the installation
is complete.
The Use whole disk for UNIX and Customize options are also available for the
second hard disk. See "Upgrading a non-primary hard disk" (page 45) ..
This section covers issues that could potentially apply to any upgrade, no
matter what seQ system you are upgrading from or what seQ OpenServer
system configuration you are installing.
If the upgrade path you choose (page 36) does not retain the user account
profiles on your system, use ap(ADM) to preserve the account profiles.
After completing the installation, copy the file filename to the new system,
and run:
ap -ro -ffilename
This restores the account profiles for every user, overwriting any existing
account profiles of the same name (including root).
This is a list of files and directories that are often configured, and may have
changes that you need to restore after installing a new seQ system. (The
Upgrade installation type attempts to preserve configurable files.) This list is
not exhaustive, nor will every file on this list have changes that you want to
save. The list is simply a starting-point for deciding which files have impor-
tant user-specific or system-specific information.
43
Installing or upgrading an seQ system
NOTE Please be aware that some of the listed files might be links. In order
to properly back up all required data, you must traverse each of these links
to the target file. Set the option on your backup utility to traverse symbolic
links. For example, use the -L option with cpio(C) , which will traverse and
back up all symbolic links.
/usr /adm/hwconfig
/usr/adm/messages
/usr /adm/pacct
/ usr / lib / mail / aliases
/ usr / lib / mail / aliases.hash
/ usr / lib / mail / faliases
/ usr / lib / mail / maliases
/ usr / lib / mail / mailrc
/ usr / lib / mkuser / *
/usr /lib /uucp /*
/ usr / lib / XII / app-defaults / *
/usr /lib /XII /Mosaic/*
/usr /lib /XII /scologin/Xservers
/ usr / lib / XII / system.mwmrc
/usr /lib /XII /sys.startrc
/usr /man/cat.LOCAL (local man pages)
/usr /man/ man. LOCAL (local man pages)
/usr / mmdf / mmdftailor
/usr /mmdf/ table/*.dom (mmdf configuration)
/usr /mmdf / table / *.chn (mmdf configuration)
(Continued)
I.profile
CAUTION mkdev hd now runs badtrk for SCSI as well as non-SCSI disks.
During mkdev hd, badtrk displays the size of the current badtrk table as the
default. Accept this default size, as changing the size of the badtrk table de-
stroys the contents of the partitions.
You can protect any filesystems on a non-primary hard disk by selecting the
Upgrade installation type or the Preserve option for setting up the secondary
hard disk. If neither of these options is available, or if you do not select either
one, select the Defer disk setup option during the installation, or remove the
additional hard disks before beginning the installation.
If you select Preserve for the second hard disk, you must run divvy for that
disk after the installation is complete. Within divvy, select n and name the
preserved partitions, then exit. Then, run mkdev fs, as described in step 4.
45
Installing or upgrading an seQ system
Follow the numbered procedure in this section for any non-primary disk that
you plan to remove before the installation, or for which you plan to select the
Defer disk setup option.
1. Before the installation, run fdisk(ADM) for each affected hard disk. For
example, for the second hard disk, enter:
fdisk -f /dev/rhdlO
Enter 1 at the main fdisk menu. Record the numbers of the fdisk parti-
tions that hold your UNIX filesystems, then exit fdisk.
2. Also before the installation, run divvy(ADM) for each affected partition
and record the information. For example, for the active partition on the
second hard disk, enter:
/etc/divvy /dev/hdla
Copy the information from your screen into the following table:
hd runs fdisk and divvy.) During mkdev hd, make sure that:
• you accept the default size for the badtrk table.
• the partition numbers in the fdisk partition table match those you
recorded before the installation.
• the information you recorded in the IiSecondary Hard Disk Filesystems"
table is in the new divvy table.
• you select n and name each filesystem. (The divvy utility now creates
device nodes for the divisions if they do not already exist, so you must
change the divvy-generated names to match the original names.)
We recommend that you remove any third-party drivers from your system
before upgrading to sea OpenServer Release 5.0.6, then restore the drivers
after you have rebooted successfully following the upgrade. If a third-party
driver from your previous sea system is not compatible with sea Open-
Server Release 5.0.6, the kernel (/stand/unix) may not link at the end of installa-
tion.
47
Installing or upgrading an seQ system
If the kernel does not link at the end of installation, try to boot from the kernel
called /stand/unix.safe (which does not contain the third-party drivers), into
single-user mode.
If the driver for the root hard disk controller is one of the third-party drivers
missing, the unix.safe kernel will not boot. If this happens, boot the system
using a boot-time loadable driver (BTLD) for this sea OpenServer system.
Then, remove the old driver from the link kit, and install the BTLD using
installpkg(ADM).
This section covers issues that may arise when upgrading from sea Open-
Server Release 5.0.0, 5.0.2, 5.0.4, or 5.0.5 to sea OpenServer Release 5.0.6.
See also:
The installation tries to rebrand the new kernel with the old serial number
during an upgrade. If this does not work, rebrand the kernel with the serial
number of a previous release using the command:
brand -n old_seriaCnumber old_activation_key /etc/conf/pack.d/kernel/os.a
Then, relink the kernel and reboot the system.
If you purchased an upgrade for one of the following scenarios, the upgrade
requires a two-step procedure:
• sea OpenServer 5.0.0, 5.0.2, or 5.0.4 Host System to sea OpenServer 5.0.5
Enterprise System
• sea OpenServer 5.0.0, 5.0.2, or 5.0.4 Desktop System to sea OpenServer
5.0.5 Enterprise System
The first step upgrades the system to sea OpenServer Release 5.0.6 in the
same configuration, and the second step upgrades the system to sea Open-
Server Enterprise System.
49
Installing or upgrading an seQ system
The first step happens automatically when you choose the Upgrade installa-
tion option. Use the license information from the previous (5.0.0, 5.0.2, 5.0.4,
or 5.0.5) Certificate of License and Authenticity (COLA) for this step.
To complete the second step, follow the instructions in Chapter 4, "Installing
and managing software components" (page 69) to invoke the Software Man-
ager and install the sca OpenServer Enterprise System. When prompted,
supply the license information from the 5.0.6 COLA.
After you install the SCO OpenServer Enterprise System, exit the Software
Manager and reboot the system.
4. Create a symbolic link from the stub directory to the original ftp home
directory:
In -s /u/ftp /usr/internet/ip/O.O.O.O/sco_ftp
NOTE Virtual domains are only available with a Fresh installation of the
Enterprise system; see Chapter 28, "Managing virtual domains" (page 473)
for more information.
51
Installing or upgrading an sea system
There are no specific issues to consider when upgrading from sea Open
Desktop Release 2.0 to sea OpenServer Release 5.0.6. Make sure you read
"Issues with any upgrade" (page 43) and the Release Notes before beginning
the installation. The material in "Upgrading from release 5.0" (page 48) may
also apply to systems running Release 3.0.
NOTE To upgrade from Release 3.0, you must select the Fresh installation
type, then preserve or restore your data using one of the methods intro-
duced in "Choosing an upgrade path" (page 36).
There are no specific issues to consider when upgrading from sea Open
Desktop Release 2.0 to sea OpenServer Release 5.0.6. Make sure you read
"Issues with any upgrade" (page 43) and the Release Notes before beginning
the installation. The material in "Upgrading from release 5.0" (page 48) may
also apply to systems running release 2.0.
NOTE To upgrade from Release 2.0, you must select the Fresh installation
type, then preserve or restore your data using one of the methods intro-
duced in "Choosing an upgrade path" (page 36).
Sometimes errors occur during the installation procedure that cause problems
as you install the software or when you boot immediately after installation.
The problem is usually not with the software or the procedure itself. Occa-
sionally, there is a hardware problem, but typically such problems are minor,
such as an improperly connected cable.
If you cannot solve your problem and you must contact your support pro-
vider for help, be sure to record your system information as described in
"Before calling for help" (page 64).
During the installation procedure, do not assume that you know what is
about to happen, even if you have installed the system before. There have
been changes to the installation process, so you should read the installation
documentation closely.
See also:
• Chapter 13, "Troubleshooting system-level problems" (page 247)
53
Troubleshooting the installation
If the system still does not boot, you most likely have a problem with your
hardware:
1. Check that your system has enough RAM (Random Access Memory)-see
your computer's documentation. Your computer must have the minimum
recognized memory listed in your Release Notes to install the operating sys-
tem.
At the Boot: prompt, entering the command mem=/p displays all the RAM
the system will use. On most systems, you can override this default using
the mem= command. See the boot(HW) manual page.
2. If your system has enough RAM, check that the boards (bus cards) are
seated properly.
3. If the system still does not boot, you may have a badly configured floppy
disk drive. Make sure that the values in the CMOS match the drives actu-
ally attached to the system and that the positions of multiple drives on the
drive cable match the BIOS configuration. If the CMOS setup has a Swap
dr i ve s setting, make sure this is turned off.
4. Check that all cards are supported (see the sea Hardware Compatibility
Handbook or SCO's Compatible Hardware Web Pages) and correctly config-
ured (as described in Chapter 14, "Basic hardware configuration" (page
271)).
5. Disable cache (to enable diagnostics) and shadow RAM.
6. If, after performing all the above tests, the system still does not boot, you
may have a hardware failure. Check the documentation that came with
your computer for hardware tests.
55
Troubleshooting the installation
• Verify that the CMOS is configured correctly. Check to make sure that the
values in the CMOS match the drives actually attached to the system and
that the positions of multiple drives on the drive cable match the BIOS con-
figuration. If the CMOS setup has a Swap drives setting, make sure this is
turned off.
• If the error message persists, call your software provider to arrange for a
new floppy disk.
System reboots from Boot Disk or screen blanks after Boot: prompt
If you cannot install because the system keeps rebooting from the Boot Disk
or the screen blanks after pressing (Enter) at the Boot: prompt, one of two
known situations may be causing this problem:
• an improperly configured EGA or VGA adapter
• an incompatible EGA or VGA adapter
If you have an EGA or a VGA adapter, check the following:
• Verify that the adapter is supported by your SCo OpenServer system.
Check the sea Hardware Compatibility Handbook or SCo's Compatible Hard-
ware Web Pages.
• Make sure that the switches on the adapter are set correctly. Many cards
have emulation modes; make sure that you are using the card in its native
mode. You can also experiment with the VGA, EGA, CGA, MONOCHROME
switches.
If the card has an AUTOSWITCH feature, the system may hang during the
startup hardware check. See "Hardware self-check stops" (page 57).
Start the installation procedure again from the beginning. You can restart the
installation completely at any time by inserting the Boot Disk, then pressing
(Enter) at the Boot: prompt. If you are using the BTLD utility and need to res-
tart, insert the Boot Disk and enter restart link=pkgl at the Boot: prompt
(where pkgl is the name of the package from which to extract the required
BTLD drivers). For more information, see" Adding BTLDs at boot time" (page
285).
If the system hangs at the hardware configuration screen again, contact your
software supplier for more information and be prepared to report the last
message displayed.
57
Troubleshooting the installation
You can then restart the installation from the beginning by inserting the Boot
Disk, then pressing (Enter) at the Boot: prompt. If you are using the BTLD util-
ity and need to restart, insert the Boot Disk and enter restart link=pkgl at the
Boot: prompt (where pkgl is the name of the package from which to extract
the required BTLD drivers). For more information, see" Adding BTLDs at boot
time" (page 285).
If the problem persists, contact your support provider for help.
If the system does not boot from the hard disk as described near the end of the
installation procedure, you may see an error message, possibly like this one:
PANIC: iinit
This generally happens if the boot block was written on a bad track. What-
ever the reason for this problem, you must reinstall your seo OpenServer sys-
tem software.
Scan for bad blocks during the installation by pressing (Space) at Hard disk
setup on the Preparing your disk and choosing software window, pressing
(Space) again at Disk 0 bad block type or Disk 0 bad track type (which option is
displayed depends on the disk type), then selecting an option.
If, after reinstalling, the operating system still does not boot, run the hardware
diagnostics that came with your computer and hard disk (if any).
This section describes some common problems that you could encounter
when you boot the system immediately after installing the software.
• "Console screen looks strange" (page 59)
• "Graphical scologin screen on tty02looks strange" (page 59)
• "Hardware does not work" (page 59)
• "DOS does not work" (page 60)
59
Troubleshooting the instal/ation
If neither the SCO OpenServer system nor DOS works after installing the sys-
tem, you need to reinstall both systems. Make certain that you followed the
guidelines in Chapter 7, "Using other operating systems with an SCO system"
(page 101) and "PhYSical and virtual DOS drives" in the sea Merge User's
Guide.
I NOTE If you are running X, this message may not appear on your console.
Refer to "Common system resource error messages" (this page) for more in-
formation about system kernel parameters.
If you are running X, these messages may not appear on your console. If your
system hangs, switch to the console multi screen by pressing <Ctrl)<Alt)<Fl), if
possible, and read the diagnostic messages. If you cannot switch mul-
tiscreens, reboot the system and read the messages in the /usr/adm/messages
and /usr/adm/syslog files.
Kernel error messages that appear while running this product are similar to
this:
CONFIG: routine - Out of streams (NSTREAM = n exceeded)
routine is the kernel routine that requested a stream or queue, but did not
allocate one and n is a decimal number indicating the current value of the
parameter setting. For information on modifying NSTREAM and other kernel
parameters, and on relinking the kernel, see Appendix B, "Configuring kernel
parameters" in the Performance Guide and the configure(ADM) manual page.
61
Troubleshooting the installation
First, you must determine whether you have a software or hardware problem.
In general, hardware problems are intermittent, while software problems are
consistent.
A critical difference between sea OpenServer systems and some DOS applica-
tions is the way they access hardware. For example, older DOS systems and
some DOS applications read or write information to a device controller (disk,
tape, or serial/parallel) by making a device-independent call to the BIOS
(Basic Input Output System). The BIOS translates the device-independent call
into a device-dependent set of instructions to transfer data to or from a partic-
ular device.
Except for very short periods of time during installation and during the boot
process, sea OpenServer systems never use the BIOS; device drivers handle
many of the functions for which DOS can use the BIOS.
By writing code that reads and writes directly to the device, DOS can also use
devices without going through the BIOS. This is similar to writing a device
driver for an seo OpenServer system. The ability to write directly to a device
is one reason some hardware works with DOS, but not with sea OpenServer
systems. The hardware vendor can make DOS work with hardware that uses
a non-standard BIOS by writing a DOS device driver that translates between
DOS and the non-standard BIOS. This makes it BIOS-compatible for DOS, even
though the BIOS is non-standard. DOS polls the system bus and the custom
device driver to access the device. Because an sea OpenServer system does
not make use of the BIOS, it expects a piece of hardware to be at a specific
interrupt vector, DMA channel, and base address, and does not recognize the
hardware if it is incorrectly configured.
63
Troubleshooting the installation
• Known conflicts exist between the default RAM buffer base address for
the wdn driver for the Western Digital WD8003 and WD8013 network-
ing cards, and certain motherboards and VGA video adapters. The wdn
driver uses the RAM buffer base address, DOOOO, as a ROM address. This
conflicts with motherboards that store CMOS information at this
address and with VGA adapters that use DOOOO as a ROM address.
To solve this problem, reconfigure your Western Digital WD8003 or
WD8013 networking hardware to use eeooo or CODOn as the RAM buffer
base address. Then, reconfigure the wdn driver using the instructions
in "Driver configuration" (page 487).
• Known conflicts exist between some brands of 16-bit VGA boards and
floppy or tape data transfer. If you experience data corruption during
floppy or tape data transfers, try configuring the card to 8-bit mode or
put it in an 8-bit slot. Consult your hardware documentation for more
information.
10. If you did a low-level format of your hard disk, you may have a format
program that does not work. Format programs that are known to work
are DOS Debug and Speedstor.
11. If you installed DOS on your hard disk, you may have a partition table that
seo OpenServer system software does not recognize. You must use DOS
version 6.0 or earlier. The DOS partition must not have been created with
Disk Manager.
Problem description
(Include steps that led to the problem and error messages, if applicable.)
System configuration
Knowing the hardware and software configuration of your system is vital to a
, correct diagnosis of your problem. If this information is readily available
when you speak to your support provider, the diagnostic process is much
easier and less time-consuming. Make sure that you list all the hardware com-
ponents, including brand names and model numbers, when you fill out the
hardware configuration trouble report worksheet. On the software configura-
tion worksheet, check the seQ OpenServer product that is installed, the
installed components (if a subset of the seQ OpenServer system is installed),
any additional seQ products, and list all applications and non-SeQ device
drivers that you installed.
65
Troubleshooting the installation
Hardware configuration
Component Brand name Model
Computer
Monitor
Processor type
Processor speed
Coprocessor
Memory size
Bus interface (PCI, IS A, MCA, EISA)
Floppy drive(s)
Video card
Video mode
Hard disk(s)
Disk Controller or Host adapter
Tape drive / Controller
Network adapter
Mouse
Serial card
Printer
Modem
Other device(s)
67
Troubleshooting the installation
To perform these and related tasks from the command line, see the
custom(ADM) manual page.
To perform these tasks across the network, see Chapter 21, "Installing and
managing software over the network" in the Networking Guide.
69
Installing and managing software components
NOTE If you start the Software Manager and the License Manager one
right after the other, the Software Manager menus may not respond. To
work around this problem, re-invoke the Software Manager.
To run the Software Manager, you must have root or sysadmin authorization.
Figure 4-1, "The Software Manager" (page 71) shows the main window for the
Software Manager and defines the symbols that mark the available software.
(Most of the symbols are based on a picture of a CD-ROM.) The figure is miss-
ing one symbol: a broken disk, indicating that the software became corrupted
during or after installation.
partially installed
fully loaded
subpackages being viewed
software patch
fully installed
Figure 4-1 The Software Manager
71
Installing and managing software components
Installing software
In the Software Manager:
NOTE The procedure for installing a patch (page 80) is now the same as the
procedure for installing any other software. Also, there is no longer an
option to "apply" a patch (activate it on its target software) without loading
it.
NOTE The CD-ROM from which you install the SCO OpenServer system
also contains many other sco products. You must purchase, install,
license, and register these additional products separately. See" Addi-
tionallicenses and products" (page 13).
3. Select the software items that you want from the list of available software,
and click on Install.
The list of available software does not include individual files. To restore
a damaged or missing file, see customextract(ADM).
4. To license the product during installation, enter the license number and
code from the Certificate of License and Authenticity when prompted. If
you defer licensing at this time, see "Licensing products" (page 89) for
instructions on licensing the product.
To install software on a machine across the network, from the Host menu,
select Open Host. Then, type in the host name, or click on Select to choose
from a list of hosts. (Sort the list by host name or IP address by toggling the
Sort by buttons, or type one or more characters into the "Filter" field to search
for a host name.) Then, install the software as you would locally.
See also:
• "Examining software packages" (page 75)
• Chapter 21, "Installing and managing software over the network" in the Network-
ing Guide
Loading software
To load software products or patches, follow the same procedure as for instal-
ling software (page 72), except:
In the Install Selection window, select the software items that you want
from the list of available software, and click on More Options. Then,
specify Load Only as the installation option, and click on Install.
Other machines can use loaded software as installation source for installing
across the network, but the software is not configured to run locally. A
loaded patch is not configured to affect its target component; that is, it is not
applied.
To configure loaded software to run locally (or to apply a patch), run the in-
stallation procedure, selecting Loaded Software as the media device.
73
Installing and managing software components
See also:
• " About the new product structure" in the Networking Guide
Removing software
In the Software Manager, select the unneeded products, components, pack-
ages, and patches from the list of installed software. Then, from the Software
menu, select Remove Software.
To leave the software loaded (page 73), click on More Options in the Confirm
Selected Software window. Then, specify Leave Loaded, and click on Remove.
(Removing a patch and leaving it loaded corresponds to the Rollback Patch
operation in earlier versions of the Software Manager.)
When you start to remove a piece of software, the Software Manager checks
to see whether it has any dependent components or packages and notifies you
of any dependencies. If dependencies are found, you can either continue the
removal procedure or cancel.
To remove software from a machine across the network, from the Host menu,
select Open Host. Then, type in the host name, or click on Select to choose
from a list of hosts. (Sort the list by host name or IP address by toggling the
Sort by buttons, or type one or more characters into the "Filter" field to search
for a host name.) Then, remove the software as you would locally.
See also:
• "Examining software packages" (page 75)
• "About products, components, and packages" (page 73)
• "About dependencies" (page 75)
• "About software patches" (page 80)
• Chapter 21, "Installing and managing software over the network" in the Network-
ing Guide
About dependencies
If software B must be installed for software A to run, software A is "depen-·
dent" on software B, and software B is a "dependency" of software A. Depen-
dencies and their dependent software may be products, components, or pack-
ages.
When you start to remove a piece of software, the Software Manager notifies
you of dependent components or packages if they exist. You can then choose
whether to continue or to cancel the removal procedure.
See also:
• "Examining software packages" (this page)
I NOTE Patches (page 80) are now listed in the same displays as other soft-
ware.
To examine software on a machine across the network, from the Host menu,
select Open Host. Then, type in the host name, or click on Select to choose
from a list of hosts. (Sort the list by host name or IP address by toggling the
Sort by buttons, or type one or more characters into the "Filter" field to search
for a host name.) Then, examine the software as you would locally.
See also:
• "About products, components, and packages" (page 73)
• Chapter 21, "Installing and managing software over the network" in the Network-
ing Guide
75
Installing and managing software components
You can see additional information about specific software in these ways:
• To see all the files contained in a listed product, component, or package,
select the list item, then from the Software menu, select Examine, then Files.
Click on Details to display a file's owner, group, and size.
• To see additional information about a listed product, component, or pack-
age, select the list item, then from the Software menu, select Examine, then
Attributes. The available information includes the dependencies, full name,
size, version number, and installation state of the software.
• To see the patches applied to a listed software item, or to see the com-
ponent affected by a listed patch, select the list item, then from the Software
menu, select Examine, then Patch Status.
To see additional information on a list item in the Patch Status window,
double-click on that item, or select the item and click on Details.
See also:
• "Loading software" (page 73)
• " About dependencies" (page 75)
See also:
• "Loading software" (page 73)
• "About dependencies" (page 75)
Verifying software
The Verify options in the Software Manager let you check the software files on
your machine against the product and component databases (which define
how each product and component should be arranged). Depending on which
Verify option you choose, you can check for (and automatically fix) broken or
missing symbolic links, and incorrect file permissions, owner, group, major
and minor numbers, and number of hard links. The verification can also
check for missing files and for incorrect file type, checksum, and size. To
resolve these discrepancies (with the exception of certain missing files), you
must fix them manually after exiting the Software Manager. (See
customextract(ADM) for information on restoring files.)
77
Installing and managing software components
NOTE The Software Manager Verify function only checks software under
the /opt/K and /var/opt/K directories. If ownership or permissions of system
directories (such as those under Jete or /bin) become corrupted on a running
system, you can use fixperm{ADM) to correct them. (For fixperm to work,
the directories must be listed in the perms list in Jete/perms; for example,
/ete/perms/rts or /ete/perms/ext.)
CAUTION If you try to print the report, but have no printer set up to
receive it, you see a completion message even though the report was not
I printed. .
I NOTE To update the product database, see the custom(ADM) manual page.
To verify software on a machine across the network, from the Host menu,
select Open Host. Then, type in the host name, or click on Select to choose
from a list of hosts. (Sort the list by host name or IP address by toggling the
Sort by buttons, or type one or more characters into the "Filter" field to search
for a host name.) Then, verify the software as you would locally.
See also:
• "About products, components, and packages" (page 73)
• "Examining software packages" (page 75)
• Chapter 21, "Installing and managing software over the network" in the Network-
ing Guide
• hierarchy(M) manual page
79
Installing and managing software components
If you have more than one system, you must make one emergency boot
floppy disk set for each machine. Label each set with the machine name and
store the floppy disks in a safe and secure place near the computer.
IWARNING If you use the wrong floppy disk set on a machine, it could cause
further corruption.
These tasks are associated with creating an emergency boot floppy disk set:
• HConfiguring the floppy disks" (page 82)
• HAdding files to the root floppy disk" (page 84)
• HTesting your emergency boot floppy disk set" (page 84)
• HReading backups" (page 84)
• HBooting from the hard disk" (page 86)
81
Creating an emergency boot floppy disk set
NOTE If you have less than 16MB of RAM installed, you may need shut
down the system (page 179) and bring it up in single-user mode (page 172)
before creating your emergency boot floppy disk set. This is because the
root floppy disk creates a RAM disk that requires 2MB of contiguous memory
(a single block of memory instead of multiple segments that add up to 2MB).
When there is insufficient contiguous memory to create the RAM disk, you
see the message: / dev / r amf s: c annat open.
1. Log in as root.
2. Use the Floppy Manager located in the Filesystems directory of the SCOad-
min hierarchy, or enter this command:
mkdevfd
3. At the main menu, enter 2 to create the emergency boot floppy disk set.
4. When prompted, indicate the type of disk drive you are using; unless you
have a 2.88MB drive, enter 2.
5. If you have more than one floppy disk drive,· you are prompted for the
drive that you are using to create the floppy disk. Enter either 0 (for the
primary drive) or 1 (for the secondary drive).
6. When prompted for the type of file system, select 1 to create the root
floppy disk. If you are creating a single boot I root floppy disk, select 3.
7. When prompted, insert a blank floppy disk and press (Enter).
8. When prompted to format the floppy disk:
• If the floppy disk is already formatted, enter n. The file system is then
created immediately.
• If the floppy disk is not formatted, enter y. You see the track and head
numbers count up as the floppy disk is formatted. (If the
letc!defaultlformat file contains the string VERIFY=Y, the format is also
verified.)
9. A file system is created on the floppy disk and system files are copied over
to a RAM disk for compression, including copying /dev/cmos to
fete/cmos. root. You can use this file to restore the CMOS settings later as
described in cmos(ADM).
10. When you see the message:
Do you want a shell escape to place extra files on the root filesystem? (yin)
If you want to place additional files on the disk, enter y and follow the
instructions in "Adding files to the root floppy disk" (page 84). Otherwise
enter n. If you are creating a single boot/root floppy disk, skip to step 13.
NOTE Disk space on the emergency boot floppy disks is limited and
I only critical utilities are loaded. Where possible, additional utilities such
as tar( C) are copied when space permits.
11. The file system is checked using fsck(ADM) and displays messages similar
to the file system check displayed at boot time. You are notified when the
the floppy disk is ready. Remove the floppy disk from the drive, and label
it "root" and include the machine name. Put a write-protect tab on it so
that you do not accidentally erase the information on the floppy disk.
12. Press (Enter) to continue and you are returned to the filesystem type menu.
Enter 2 to create the boot floppy disk.
13. You have two options for the boot floppy disk: a system-specific disk that
contains the same kernel that is currently on your system, or a smaller
"generic" kernel that has fewer drivers linked in. If your current kernel is
too large to fit on the disk, you will be warned and you will have to select
the generic disk.
14. Insert the floppy disk and respond to the prompts as you did for inserting
and formatting the root floppy disk.
15. The boot floppy disk is created and you see messages as files are copied to
the disk. Then, the filesystem is checked using fsck(ADM). When com-
plete, be sure and label it as you did with the root disk.
16. Follow the procedure in the "Testing your emergency boot floppy disk set"
(page 84) section to verify that you can boot your system and access back-
ups using your boot and root floppy disks.
Store your emergency boot floppy disk set (or single boot / root floppy disk) in
a safe and secure place. Make sure they are easily accessible; you will need
them if your system becomes corrupted and is no longer boatable.
83
Creating an emergency boot floppy disk set
If you have enough free space available, you can copy additional files to the
root floppy disk. For example, to copy the file /usr/pest to the disk, you would
enter:
ep /usr/pest /mnt/usr
When your additions are complete, enter exit 0 at the bootroot> prompt.
Reading backups
At the end of the installation procedure, you made a complete backup of your
system. If you have not already backed up your system, do it now using the
instructions in "Running unscheduled filesystem backups" in the System
Administration Guide.
Verify that you can read from this backup after booting from the emergency
boot floppy disk set.
NOTE Unless you have a second floppy disk drive, you can only read from
I tape backups when you boot from the floppy disk drive with your boot and
root floppy disks.
NOTE You must be able to access your backup tape volumes when you
I boot from the emergency boot floppy disk set. If you cannot, follow the
steps in the next section, "Booting from the hard disk".
3. Once you are satisfied that you can read backups after booting from your
emergency boot floppy disk set, reboot the system from the hard disk by
entering /etc/haltsys at the prompt.
4. When you see the message to reboot, remove the floppy disk from the
drive and press (Enter).
5. At the Boot: prompt, press (Enter) to boot from the hard drive.
For information on using your emergency boot floppy disk set to access and
restore a corrupted root filesystem, see "Restoring a corrupted root file system"
(page 250).
WARNING If root is not directed to vdisk ( 1 ), then the two halves of the
I mirror will become out-of-date, which could corrupt the filesystem when
the machine is next booted from the hard disk.
85
Creating an emergency boot floppy disk set
To license and register a product with the License Manager (page 88), log in
as root and follow these steps:
1. Install the product (page 72).
2. License the product (page 89).
3. Obtain your Registration Key (page 91).
4. Register the product (page 90).
See also:
• "Licensing and registration terminology" (page 13)
• "Licensing additional users and CPUs" (page 90)
• "Removing product licenses" (page 90)
• "Troubleshooting license and registration problems" (page 93)
87
Licensing and registering seQ products
When you start the License Manager, this window displays the software
products currently installed on the system:
The sea System 10, used to register the product (page 90), is shown at the
bottom of the window.
For more information on using SCOadmin managers, see HAdministering
your system with SCOadmin" (page 143).
Licensing products
In the License Manager:
1. Select the product you wish to license from the list of installed products.
INOTE Remember to register all products (page 90); your system software
displays frequent reminders until they have been registered.
To determine which products have been licensed or registered, use the View
menu in the License Manager.
89
Licensing and registering seQ products
I NOTE You cannot license additional users and epus for the Free* sea prod-
ucts.
I NOTE Remember to register all products (page 90); your system software
displays frequent reminders until they have been registered.
If you remove a product license, that functionality will no longer work on that
system.
Registering products
Most of sea's commercial products require registration after installation.
Registration is your confirmation to sea that you have installed and licensed
an sea product. You can perform registration interactively at
http://www.sco.com/register.
* "Free" means that there is no charge to license the software for personal and non-commercial use. The
media kit has a nominal fee, and any number of users can share it. Each installation requires a unique
license.
Some products (such as the Free* sea products) do not need to be registered.
Once you have installed and licensed your sea products, register them as
soon as possible to deactivate the frequent reminder messages your system
software generates. To do so:
1. Complete the sea Product Registration Form in the seQ Software Registra-
tion booklet provided with your software. You can register up to six sea
products with each form. We encourage you to register all your products
at one time.
Remember to:
a. Copy the unique sea System ID assigned to your system from the bot-
tom of the License Manager window (page 88) onto the sea Product
Registration Form.
b. Transfer the License Number label from the Certificate of License and
Authenticity (also known as a "COLA") to the sea Product Registra-
tion Form for each product that you are registering. If you do not have
the label, write the License Number printed on the Certificate in one of
the six numbered boxes on the sea Product Registration Form.
c. Complete the information about your organization and your software
supplier.
2. Obtain your Registration Key in one of the following ways:
• Fax the completed sea Product Registration Form to an sea Registra-
tion Center. You may send the fax at any time of the day. The sea
Registration Center will send you a Registration Key by fax within 24
hours. If sea cannot fax the Registration Key, it will be sent by post.
• Register by telephone. Telephone registrations will be confirmed by fax
or post.
• Mail the sea Product Registration Form to an sea Registration Center.
The sea Registration Center will send you a Registration Key by post.
• Access the Web Registration system from sea's Home Page at
http://www3.sco.com/Products. The Web Registration form is
currently offered only in English.
* "Free" means that there is no charge to license the software for personal and non-commercial use. The
media kit has a nominal fee, and any number of users can share it. Each installation requires a unique
license.
91
Licensing and registering seQ products
Once all the sea products on a system have been registered, registration rem-
inder messages will no longer appear.
NOTE Your software generates a new sea System ID each time you do a
low-level format of the disk. If you do a low-level reformat, you must con-
tact an sea Registration Center to obtain a new Registration Key and repeat
the registration process (page 90).
See also:
• "Troubleshooting license and registration problems" (page 93)
* "Free" means that there is no charge to license the software for personal and non-commercial use. The
media kit has a nominal fee, and any number of users can share it. Each installation requires a unique
license.
I NOTE The brand command only reports usage for login licenses, not for
other product licenses.
If you lose your Registration Key before you enter it, contact an sea Registra-
tion Center. Tell the registration operator that you have lost your Registration
Key. After verifying your registration information, the operator will reissue
your original Registration Key.
93
Licensing and registering sea products
The start and end dates for the license are the last two numbers respec-
tively on the first line of data for each product. The number you are
interested in is the end date, shown in bold in the example.
2. Use the fmtc1ock(TCL) command to convert the expiration time to the
more usual date format, as in this example where the user input is in bold:
# tel
tcl>fmteloek 3955219199
Mon Jan 18 19:14:07 PST 2038
tcl>
95
Licensing and registering seQ products
NOTE You may be logged out and be unable to log in to troubleshoot the
problem. Additional error messages may also appear. If so, simply turn the
system off and reboot. If the error messages persist when the system is
brought up, follow the procedures described here.
If the ifor-pmd binary is actually missing from the /opt/K/SCO directory tree,
you can use the customextract(ADM) command to install a single file from the
installation media. In the case of cdrom media and the cdrom device /dev/cdO,
the command would be:
customextract -m /dev/cdO /opt/K/SCO/Unix/* /pmd/ifor_pmd
After the restore is complete, you should use the Software Manager to verify
the link in jete.
If /pmd exists, but any of its file contents do not, they may be restored by stop-
ping and restarting /ete/ifor-pmd. In order to do this, perform these steps:
1. Enter the command:
ps -ef I grep ifor_pmd I grep -v grep
which should return two lines similar to this:
root 41 1 0 Aug-29 00:00:00 /ete/ifor_pmd
root 42 41 0 Aug-29 00:00:04 /ete/ifor_pmd
Any of the numbers shown may vary on your system, with the exception
that one of the entries should have "I" in the third field (parent process
ID). This is the "parent" copy of ifor-pmd, and the other entry is the
"child", whose parent process ID should match the second field (process
ID) of the parent entry.
2. Kill the child ifor-pmd. In the example, the command would be:
kill 42
3. In a few moments, run the ps command again. You should observe that a
new child ifor-pmd is running.
4. Check the contents of /pmd. You should see four files:
IPCCT_pipe
PMDCT_pipe
LST_pipe
ifor_pmd.pid
97
Licensing and registering seQ products
If the login user count has not been exceeded, it is possible that the license
database itself has been corrupted. Follow the steps below to re-apply the user
licenses on the system. This procedure assumes that user licenses are supplied
only through the sea OpenServer Enterprise System Certificate of License
and Authenticity. If you have already licensed additional users with a
separate user-license product, apply the procedure to that product first.
1. Tell all users to log off the system.
2. When all users are logged off, invoke the License Manager, select seD
OpenServer Enterprise System, and choose License ¢ Remove License to
remove the sea OpenServer Enterprise System license.
3. Re-license and register the sea OpenServer Enterprise System, choosing
the appropriate options in the License Manager.
4. Run the grep command discussed in "Key files or directories are missing"
(page 97) to check whether the policy manager daemon is running. If two
instances of the /ete/ifor-pmd process are not running, issue this command
to restart the policy manager:
/etc/ifor_pmd
Repeat the grep command to verify that two instances of ifor-pmd are run-
ning.
5. Tell users to log back in to the system.
If the streams line shows a fail greater than zero, then run the
Hardware/Kernel Manager (page 286) or the configure(ADM) command and
increase the NSTREAM kernel parameter. See "Tuning STREAMS usage" in the
Performance Guide for more information.
99
Ucensing and registering seQ products
101
Using other operating systems with an seQ system
In addition:
• sea systems do not include tools to exchange files from as / 2 or Windows
NT partitions.
• You must use fdisk(ADM) to switch to or from OS/2 or Windows NT.
• fdisk(ADM) displays as / 2 and Windows NT partitions as as / 2.
NOTE If a second disk is installed you get a primary partition on the second
disk and, optionally, an extended partition. You cannot boot DOS from the
second extended partition.
If you want a physical DOS partition on an sea system, you can create it
before, during, or after you install your sea system, as long as you follow the
restrictions listed below.
NOTE If you create a physical DOS partition before installing the product,
you must select the Preserve installation option to preserve the existing DOS
partition during hard disk initialization.
Use the utilities and documentation packaged with your computer hardware
and your DOS installation documentation. "Partitioning the hard disk using
fdisk (Interactive installation)" (page 105) explains how the UNIX partition
and DOS partitions share the hard disk.
I NOTE The DOS format command is not the same as a low-level format.
• When using the Interactive installation option, verify that the size of your
UNIX partition is a multiple of the number of heads on the hard disk. (If
you remapped the drive during a low-level format of the disk, use the
mapped number of heads.) Otherwise fdisk(ADM} warns that the UNIX
partition is not on a cylinder boundary.
In addition, do not begin the UNIX partition on the track immediately fol-
lowing the last track of the DOS partition. A safe rule is to set the first track
of the UNIX partition to the ending block of DOS plus the number of heads
on the hard disk (if you remapped the drive during a low-level format of
the disk, use the mapped number of heads). As DOS does not expect
another operating system after its last track, it sometimes uses that space to
store programs temporarily. If you install the UNIX partition directly after
the DOS partition, you may lose the boot block.
• Do not use a disk partitioning product from another supplier, such as Disk
Manager, to partition the hard disk before installing DOS and the seo sys-
tem. Use DOS fdisk to partition DOS, and UNIX fdisk to partition the seo
system.
I NOTE If you do not follow these restrictions, you may have problems. If so,
you will have to begin again with a low-level format of your hard disk.
103
Using other operating systems with an sea system
Many ESDI and SCSI disk controllers have on-board BIOS routines. You can
use these routines to perform a low-level format of your disk:
1. Boot DOS.
2. At the DOS prompt, enter:
debug
To determine the number of tracks per cylinder, you must know the number
of platters in your hard disk. Usually there are two tracks per hard disk
platter. For example, a hard disk with two physical platters has four tracks
per cylinder.
To determine disk size, you should multiply the number of heads by the num-
ber of cylinders, times the number of sectors per track, times 512 (the number
of bytes per sector).
105
Using other operating systems with an seQ system
If you install a UNIX partition on the same disk after the DOS (or extended
DOS) partition, start the UNIX partition at the beginning of the next cylinder
on the disk. To find the beginning of the next cylinder, note the ending
track number of your DOS partition and start the UNIX partition on the next
track number that is a multiple of the number of heads on your hard disk.
For example, if you have five heads on your hard disk and your DOS parti-
tion ends at track 103, start your UNIX partition at track 105.
When you are running the seo system, the device name of the active UNIX
partition is /dev/hdOa. For more information about hard disk device names, see
the hd(HW) manual page.
+-------------+----------+-----------+---------+---------+---------+
I Partition I Status I Type Start I End I Size I
+-------------+----------+-----------+---------+---------+---------+
1 Inactive DOS 5 398 393
2 Inactive DOS (ext) 400 1219 819
3 Active UNIX 1220 2220 1000
+-------------+----------+-----------+---------+---------+---------+
Total disk size: 2229 tracks (17 reserved for masterboot and diagnostics)
When you use the boot prompt or a floppy disk to boot another operating sys-
tem, the UNIX partition remains active even though you have switched oper-
ating systems. When you use fdisk, the UNIX partition is inactive until you
switch back to it.
INOTE The system boots from the first DOS partition found. The dos boot
string applies to any DOS partition, including those containing Windows 95.
107
Using other operating systems with an seQ system
Remember that if you have an active UNIX partition and boot DOS from a
floppy disk you can transfer to C: to work with the DOS files.
The other way to change operating systems is to run fdisk and change the
active partition from the UNIX partition to DOS. Then, after you shut down
the system (see the previous steps) DOS boots from the hard disk. From here
you can switch operating systems from the DOS partitions. You do not need a
boatable DOS floppy disk as long as DOS is loaded on the DOS partition of the
hard disk.
To switch back to the UNIX partition, run fdisk under DOS and make the UNIX
partition active. To reboot the UNIX partition, press (Ctrl)(Alt)(Del) or the reset
key, or turn the computer off, then on.
Because the UNIX partition must be active for it to operate, you cannot use a
boatable floppy disk to boot the operating system. Using fdisk is appropriate
for an occasional change of the active operating system.
The hard disk device names in Table 7-1 (page 108) are similar to /dev/hdOa
(the active disk partition) in that the disk driver determines which partition is
the DOS partition and uses that as hdOd and hdld. (You can use the XENIX or
UNIX system device name conventions; they are equivalent.) This means that
software that is running from the UNIX partition and using the DOS partition
does not need to know which partition is DOS (the disk driver determines
that).
109
Using other operating systems with an seQ system
7. Designate UNIX as the active operating system using the Activate Partition
option of fdisk.
8. Finish installing the seo system distribution.
NOTE UNIX fdisk displays DOS partitions as HDOS" while DOS fdisk dis-
plays UNIX partitions as HOther". You can only create DOS partitions using
DOS fdisk, and UNIX partitions using UNIX fdisk.
Be aware that DOS fdisk reports sizes in terms of cylinders, while UNIX
fdisk reports sizes in terms of tracks. Check your hard disk manual for the
number and size of cylinders on your hard disk.
One configuration consists of designating the entire first disk as a UNIX parti-
tion. You then use a DOS boot floppy disk to start DOS and specify:
A> D:
to switch to the DOS area on the second hard disk, where D: is the designa-
tion for the second hard disk. This strategy works for some versions of DOS.
Early versions recognize only the first hard disk on the system.
I NOTE If you devote a hard disk for use with DOS, the disk must already be
configured under DOS.
Another method is to maintain a small DOS partition on the first hard disk.
The DOS partition is designated the active partition. In this configuration, the
computer always boots DOS. This requires changing the active partition to
boot the seo system from the hard disk.
If you use the entire second disk for DOS, you need only create the additional
special device files in /dev so that you can access the DOS partition. See
HAccessing DOS partitions on a second disk" (page 114) for more information.
I NOTE Be sure to make a backup copy of your boot floppies if you use them
to boot your secondary operating system.
You can then reallocate that space by either adding another UNIX or DOS par-
tition, or enlarging an existing partition. Enlarging a partition requires rein-
stalling the operating system and (for a UNIX partition) remaking the file-
system on the partition using divvy(ADM).
NOTE Mounting DOS file systems and accessing the files directly with UNIX
commands is faster and more efficient than using the doscmd( c) utilities.
See flMounting DOS file systems or partitions" (page 113) for more informa-
tion.
You may also be able to use the UNIX system dd(C) and diskcp(e) commands
to copy and compare DOS floppies. The UNIX system dtype(C) command tells
you what type of floppies you have (various DOS and UNIX system types).
Also, the file letc!defaultlmsdos describes which DOS file systems (for example,
A:, B:, C:, ... ) correspond to which UNIX system devices.
INOTE You cannot execute (run) DOS programs or applications from an seo
system unless seo Merge is installed.
111
Using other operating systems with an seQ system
seo systems do not record bad tracks in the DOS area of the hard disk. If a bad
track develops in the DOS area, an operation such as doscp that attempts to
access the affected area may fail (resulting in the Error on fixed disk mes-
sage).
NOTE When trying to use the DOS utilities to access files on your DOS parti-
tion, you may see the error message bad media byte. This message indi-
cates that the DOS partition on the hard disk is not bootable. You can make
your DOS partition bootable by first backing up the files on the DOS parti-
tion, booting DOS from the floppy, and formatting the DOS partition using
the command:
format c:. Is
You should now reinstall your DOS files.
NOTE If you get the message cannot open /dev/dsk/OsC (or similar mes-
sage), check the user permissions on the special device file involved. As root,
change the permissions with the chmod command. For example:
chmod 666 Idev/dsk/osC
gives full read and write permissions to all users for the special device file
IdevldsklOsC, which is the DOS partition on the primary hard disk.
NOTE You must add support for DOS file systems to the kernel before you
can mount DOS filesystems. See Adding support for different file system
fI
You can mount DOS file systems from the Filesystem Manager after adding
them to the mount configuration as described in "Adding and removing
mount configuration" in the System Administration Guide. You must use the
device names shown in Table 7-2, "DOS device names" (page 114) or create
the nodes described in "Accessing DOS partitions on a second disk" (page
114) For information on the behavior of DOS file systems, see" About mount-
ing DOS filesystems" in the System Administration Guide.
You can also mount these partitions manually using the mount(ADM) com-
mand. The form for a DOS file system mount command is:
mount -r -f DOS /dev/dsk/xsy /mountpoint
where:
x is the hard disk number
y is the drive letter (for example, C:, D:)
mountpoint is the name of the directory in the root filesystem where the
DOS filesystem is to be mounted.
The -r flag mounts the filesystem read-only, an optional precaution that will
prevent damage to the DOS filesystem (which is not as robust as other file-
systems.
DOS automatically calls the primary DOS drive, on the first disk, C:. If you
have a primary DOS partition on the second disk this becomes D:, automati-
cally, and logical drives on extended partitions are named in order (for exam-
ple diskO Primary C: EXT E: F: G: H:, disk1 Primary D: EXT I: I:). Table 7-2
(page 114) lists these device names under DOS and seo systems.
113
Using other operating systems with an seQ system
I NOTE When using mount, you must give the specific hard disk and parti-
tion numbers (wildcards are not allowed).
If you are not mounting the DOS file system and plan to use doscmd{C) com-
mands to access the files, you should add appropriate entries to the
/etc!default/msdos file (page 112). For example, if the third multiple DOS parti-
tion on the second hard disk were called H: you could include the line:
H=/dev/dsk/lsE
in the /etc!default/msdos file. From then on any access to H: would refer to
/dev/dsk/lsE, the third multiple DOS partition on the second hard disk.
117
Using the system
For UNIX systems, a system administrator (page 138) takes care of the system:
maintaining it, backing up files, installing software, and handling any prob-
lems that might come up. System administrators also sometimes assist users.
This chapter focuses on using the system; for more information on system
administration, see Chapter 9," Administering seo systems" (page 137).
On the most basic level, you can bring information into your system (through
the keyboard, disks, tapes, modems, or network connections), store the infor-
mation in files, organize and manipulate those files, and send information out
from your system (through the screen, printers, disks, tapes, modems, or net-
work connections). By combining these operations, especially by using pro-
grams that combine them, you can accomplish complex tasks ranging from
accounting to word processing to database research to developing other pro-
grams.
To use the system most effectively, you should understand how to:
• Login.
One of the security features of UNIX systems is the requirement that users
identify themselves at the beginning of a session with their login names
and passwords. For Desktop instructions, see "Starting the Desktop" (page
121). For command-line instructions, see the Operating System User's Guide.
• Run programs and enter commands.
For Desktop instructions, see "Using Desktop features" (page 122). On the
command line, type the command (with any options or arguments) and
press (Enter). For additional instructions on running programs on the com-
mand line, see the Operating System User's Guide. For DOS command-line
and Windows instructions, see the seQ Merge User's Guide.
119
Using the system
NOTE Users should log in with a non-root account to do their daily tasks. It
is recommended that only system administrators log in as root on the Desk-
top.
If you do not have an account (login) name and password, see your system
administrator or the System Administration Guide. If you have problems, make
sure that the "login" field is highlighted (selected) before entering your name.
To select the field, use the mouse to move the pointer into that field, then
briefly press and release (click) the left mouse button (mouse button 1).
If your screen is blank, try pressing any key. If your screen is still blank, make
sure your terminal is turned on.
If your screen is not blank, the absence of the login box means that the Desk-
top has been set up to start differently at your site. The most common alterna-
tive setup requires you to:
1. Enter your login name at a command-line prompt.
2. Enter your password.
3. At the prompt, enter: startx.
See your system administrator for instructions if the Desktop still fails to start.
When you are asked, click mouse button 1 on the OK button to confirm that
you want to log out.
121
Using the system
menus
pointer
{text curso
~~
2
1:
e
.;•,~. :.•
mouse
«'
::':
Right-handed
3
3
:::
.~..•
!
~
'~
Left-handed
mouse
1
123
Using the system
Using windows
Windows play an important role in your work on the Desktop. For example,
you can have several windows open at the same time, such as one for reading
your mail and one for writing contracts. You can then move easily back and
forth between these two workspaces, and you can transfer a document or tool
from one window (workspace) to another, just as you would on your desk.
maximize button
Every window has a Window menu you can use to move, resize, or close the
window. Open this menu by clicking on the Window menu button in the upper
left corner of the window's frame.
To close a window, select Exit from the File menu or double-click on the Win-
dow menu button or select Close from the Window menu.
Scrolling
When there is more information to display than can fit in a window, use the
scroll bars to see more:
• To scroll smoothly through the window's contents, drag the scroll bar
slider.
• To move in short jumps toward the top or bottom (or right or left edge) of
the window's contents, click on the arrow at either end of the scroll bar.
• To jump by one full window, click on the scroll bar between the slider and
one of the arrows.
The position of the slider in the scroll bar indicates how much of the window's
contents lies to either side of the portion displayed in the window.
Using menus
Each window has a menu bar that lists the names of the menus available in
that window. To open a menu, click on its name. To select an item from the
open menu, click on that item. To close the menu without selecting an item,
move the pointer off the menu and click (or release) the mouse button.
If the menu item you select requires that you make additional choices, a sub-
menu appears. Use the same methods for selecting from submenus.
125
Using the system
Using icons
Some icons represent unique functions and are illustrated accordingly. The
Trash icon, for example, represents the Trash desktop, which contains your
discarded files and directories.
For example, you can control the sea Panner window manager by using a
feature known as the Hpanner", which contains a map of your entire
workspace, divided by a grid into a number of rectangular regions. These
regions serve as work areas. Also provided is a Hviewfinder", which allows
you to navigate around the workspace and change your view area.
For more information, see the online help book, Using sea Fanner.
Getting help
You can access online help in a variety of ways:
• From the Desktop, either double-click on the Help icon or select On Help
from the Desktop Help menu.
• To get help on a specific Desktop icon, either click on that icon and select
On Object from the Help menu or drop the icon on the Help icon.
• From the Desktop, open a UNIX window and type scohelp at the command
line.
• When available in a window or dialog box, use the Help menu or click on
the Help button.
• Point to the object on which you want help and press (F1) (not supported
on the Desktop itself). Some Desktop icons do not have context-sensitive
help. For more information about using Desktop icons, see Using the Desk-
top in the Documentation Library.
• In a character environment, use the (Tab) and arrow keys to select the Help
item, then press (Enter).
See also:
• "Getting character-based help" (page 128)
• "Finding information" in Using Help
127
Using the system
If the information you need is not on the current screen when the Help win-
dow opens, use the (PgDn) or (PgUp) key to scroll through the document.
To view topics related to the current one, use the (Tab) and arrow keys to
select Related Topics at the bottom of your screen. Press (Enter). Each item in
the Related Topics window is a hyperlink to another topic.
To open a related topic, use the (Tab) key to move the cursor to the View
Topics window. Use your arrow keys to move the cursor over the desired
topic, then press (Enter).
To close the help window, use your (Tab) key to move your cursor to Close
Window, then press (Enter). Your cursor returns to the current SCOadmin or
configuration manager tool.
To start the Mail program, double-click on the Mail icon on the Desktop.
The Mailbox window displays a list of mail messages that are in your mail-
box (called the "message" list). The easiest way to select a message to read is
to click on it in the message list.
Each line in the message list describes a message: who sent it, what it is about
(the subject), when it was sent, and how big it is. Some messages have addi-
tional graphical information under the "Kind" heading. For example, you
might see that you have not yet read a message, or that you have already
replied to or saved it.
The bottom half of the Mailbox window contains the contents of the currently
selected (highlighted) message. If a message is longer than the window, use
the scroll bar to view the rest of the text.
129
Using the system
The icons below the Mailbox menu bar are called toolbar icons. When you
point to one of these icons, a brief description of that icon's function is dis-
played at the bottom of the window.
Sending e-mail
1. Select Create from the Mailbox window Message menu. You see this win-
dow:
2. Type the desired text in the "Subject" field, then press <Enter). For example:
Remember to feed the cats!
3. Type your account name in the "Td' field, then press <Enter). When you
send and receive mail, your account name is sometimes called your mail
address.
To add, delete, or change text in the Message window, see the online
Using Edit book.
6. Select Deliver from the Message window Message menu.
This sends the message and closes the Message window.
Replying to e-mail
To move, delete, and change text in the Message window, see the online
Using Edit book.
5. Select Deliver from the Message window Message menu.
131
Using the system
Saving messages
If you want to keep mail messages, you can save them in files or in mailfolders
(special files that contain mail messages). To keep your mailbox tidy, you
should remove messages regularly from your personal mailbox.
1. Click on the first message in the top half of the Mailbox window. The
selected message is highlighted.
2. Select Save To Folder from the Mailbox window Message menu.
This opens the Mail window containing a list of mailfolders. (When you
first start working with Mail, your mailfolders directory might only contain
the Outgoing mailfolder.)
3. Click on the blank area in the "Selection" field, type ReminderMail, and
press (Enter). This specifies ReminderMail as the mailfolder where you
want to save the message.
You are prompted to create the folder.
4. Click on Yes. The message is saved to a mailfolder called ReminderMail in
the mailfolders subdirectory of your home directory and you return to the
Message window.
5. Select Undelete from the Mailbox window Edit menu. The first message
disappears from the list of deleted messages.
6. Select All from the Mailbox window View menu. This returns you to
viewing the remaining contents of your mailbox (all the messages you
haven't deleted and the message you just restored).
133
Using the system
137
Administering seQ systems
Depending on the size of the system and the number of users on it, system
administration can be anything from a once-a-day task to a full-time job.
Even if the system is small, the system administrator should consistently per-
form each required maintenance task, because sloppy maintenance can
adversely affect system performance.
You can choose to have a single system administrator or divide the tasks
among several persons, each charged with a different area of operation. You
can even assign roles that are strictly limited to one aspect of the system. See
" Assigning subsystem authorizations" in the System Administration Guide for
more information.
I NOTE Keep a copy of your installation checklist in the log book. See "Ins-
tallation and upgrade checklist" (page 20).
All tasks are presented from a system administrator's point of view, but many
can also be accomplished by ordinary users. Because some of the tasks
dramatically change the system's operation, we recommend that, whenever
possible, the system administrator perform these tasks. However, no matter
who performs an operation, it should be entered in the system log. Following
these rules can prevent unwanted or unnecessary changes to the system.
139
Administering seQ systems
WARNING Few users should know the superuser password. Misuse of the
I superuser powers by naive users can result in a loss of data, programs, and
even the operating system itself.
The keyboard
Many keys and key combinations perform special actions on sea systems.
These actions have names that may not correspond to the key top labels on
your keyboard. Table 9-1 (this page) shows which keys on a typical keyboard
correspond to special actions on sea systems. A list for your particular login
device is in the keyboard(HW) manual page. Many of these keys can be
modified by the user - see the stty(e) manual page.
Name Action
(Enter) terminates a command line and initiates an action. This key is
also called the (Return) key; the key top may indicate a down-left
arrow.
(Esc) exits the current mode; for example, exits insert mode when in
the editor vi. This is also known as the ESCAPE key.
(Del) stops the current program, returning to the shell prompt. This
key is also known as the INTERRUPT key.
(Bksp) deletes the character to the left of the cursor. The key top may
show a left arrow (do not confuse it with the keypad arrow
keys).
Name Action
(Ctrl)D signals the end of input from the keyboard; exits the current
shell, or logs you out if the current shell is the login shell.
(Ctrl)H deletes the character to the left of the cursor. This is also called
the ERASE key.
(Ctrl)Q restarts printing (or displaying) after it is stopped with (Ctrl)S.
(Ctrl)S stops printing (or displaying) at the standard output device, such
as a terminal. This keystroke does not stop the program.
(Ctrl)U deletes all characters on the current line. This is also called the
KILL key.
(Ctrl) \ quits current command, creates a core file - see the core(FP)
manual page. This is also called the QUIT key. Recommended
for debugging only, but can be used as a last resort when the
(Del) key does not stop the current command.
To open a second screen, press and hold the (Ctrl) and (Alt) keys, then press
(F2) or another function key on your keyboard. Function keys are generally
located across the top or down the far left side of your keyboard.
After you press the key combination, the screen clears and a login prompt
appears. Log in again and you can begin work on the second "screen." Press
(Ctrl)(Alt)(Fl) to switch instantly back to the first screen. Switching between
screens in this way can speed up procedures that require working in two
different programs. You can run both programs simultaneously, and work on
either one at any time.
For example, you can start a session on your first screen, then press
(Ctrl)(Alt)(F2) to create a second screen. Log in again and begin another ses-
sion. Use (Ctrl)(Alt)(Fl) and (Ctrl)(Alt)(F2) to switch back and forth between
screens.
I NOTE Opening more than one graphical session or desktop on the console
will consu~e additional system resources.
141
Administering seQ systems
i I
You can open more than two screens at once. However, when you log out you
must remember to log out on all screens; unattended screens where you
remain logged in allow unauthorized access to the system.
If you have several screens open at once, you can rotate through them by
pressing {Ctrl){PrtSc). This is helpful if you cannot remember which process is
running on a particular screen.
For more information, refer to multiscreen(M).
System security
An important consideration is protecting the system and its data from unau-
thorized access. Your sca system includes security mechanisms designed to
meet the C2 class of "trust" as defined by the Trusted Computer System Evalua-
tion Criteria (also known as the Orange Book). As the system administrator,
you can configure the protection mechanisms to the requirements of your site.
Chapter 1," Administering user accounts" in the System Administration Guide
explains how to add users to the system and how to configure the default
security scheme. For additional information on protecting your system, con-
sult Chapter 5, "Maintaining system security" in the System Administration
Guide.
NOTE Unless your system is configured with the Low security profile, ordi-
nary users are not authorized to run SCOadmin managers. See" Assigning
subsystem authorizations" in the System Administration Guide for more infor-
mation.
Most SCOadmin managers are grouped under folders (directories) that corre-
spond to an administrative area.
(page 149).
See also:
• "About Sysadmsh Legacy" (page 145)
• "Troubleshooting SCOadmin" (page 156)
143
Administering sea systems
To run in character mode from a scoterm window, set the CHARM environ-
ment variable to TRUE. To run in the graphical environment again, unset
CHARM or set it to FALSE.
To ascend the directory tree, click on the parent directory button in the lower
left hand corner of the SCOadmin window, or select Parent from the View
menu.
You can also start individual SCOadmin managers from the command line
using the syntax:
scoadmin application_name
where application_name is the name of the SCOadmin manager, such as
account manager. (You do not need to quote the name or use capitalization.)
This command works both graphically and in character mode.
NOTE SCOadmin managers are scripts written in sea Visual Tcl. Modify-
ing these scripts is not recommended, but if you do alter them, be sure and
make a backup copy first. See the scoadmin{ADM) and scoadmin{F) manual
pages and the sea Visual Tel Programmer's Guide and Reference (page 000) for
more information.
See also:
• II Administering other systems with Seaadmin" (page 149)
Backup Manager
Hardware/Kernel Manager
License Manager
Soft\J.Jare Manager
Video Configuration Manager
Filesystems
Mail
Networks
III Pri nte rs
rII Sysadmsh Legacy
III System
145
Administering sea systems
To set the rate at which the display is automatically updated, select Set Auto
Refresh from the View menu.
You can get point help on a text field or other screen element simply by mov-
ing the cursor to it. In character mode, highlight the screen element.
To disable the point help feature, deselect the Point Help button from the
Options menu.
Use the arrow keys to move between items on a menu bar or items in a menu.
Use the (Enter) key to open a menu or make a selection.
I NOTE If you are having trouble reaching a button or field, try pressing the
(Tab) key.
Figure 9-3 (this page) is a character-mode screen from the Account Manager.
To navigate this screen from top to bottom, press the (Tab) key. There are two
rows of buttons: the "Password" selection box and the OK, Cancel, and Help
pushbuttons. Use the arrow keys to move between the buttons.
147
Administering seQ systems
Key Action
(Tab), (Ctrl)i moves to next tab group
(Ctrlt, (Shift)(Tab) moves to the previous tab group
(Left, Right Arrow) traverses menu bar, moves between items in a tab group,
opens or closes submenu, scrolls list
(Up, Down Arrow) opens a menu in menu bar, moves between items in a
menu, moves between items in a tab group or a
displayed list
(Ctrl)A replicates (Alt) in graphical environment
(FlO) shifts focus to menu bar
(Enter) accepts input in text field, opens menu
(Esc) cancels action (if applicable), closes menu
(Ctrl)r redraws the screen
(PgUp), (PgDn) pages through displayed list
(Home), (End) shifts between top and bottom of list
(Space) selects the highlighted item
Networking Guide.
149
Administering sea systems
To edit a default file, select the file from the list. When used in character
mode, the vi(C) editor is used by default. For graphical sessions, another edi-
tor can be selected; see HChanging the default editor" (this page).
See also:
• default(F) manual page
• Appendix H, "vi command summary" (page 543)
• "Using the vi editor" in the Operating System Tutorial
You can also add EDITOR to your shell initialization file. For the C shell, sim-
ply add the above line to your .login or .cshrc file. For the Bourne or Korn
shells, you need to add the bold elements to your .profile file:
SHELL=/bin/sh
HOME=/
PATH=/bin:/etc:/usr/bin:/tcb/bin
EDITOR=/usr/bin/Xll/scoedit
Processes are programs currently running on the system. You can use the
SCOadmin Process Manager to perform operations on system processes
(locally and on remote systems):
• view processes on the system (this page)
• change the priority of a process (page 154)
• send a signal to a process (page 154)
You can start the Process Manager by running the scoadmin(ADM) launcher
or entering scoadmin process on the command line.
Viewing processes
You have several options for viewing processes with the Process Manager:
• view all processes (this page)
• by one or more attributes (this page)
• by attribute value (page 152)
• sorted by PID, user, tty, or command (page 153)
• customize the attributes displayed (page 153)
• include/exclude attributes in status labels (page 153)
151
Administering seQ systems
To view processes by a set of extended attributes, select Attributes ... from the
View menu. The extended attributes are shown in Table 9-3, "Process attri-
butes" (this page) You also have the option of clicking on buttons that select a
set of attributes (a Default is automatically selected), including Ownership ...
Select an attribute in the" Available" column and click on the Add button. You
can remove an attribute from your view by selecting it from the "Selected"
column and clicking on the Remove button. You can search for a specific
attribute by entering it in the "Search for:" field.
Sorting processes
In the Process Manager (page 151), select Sort, from the View menu.
Select the desired sort attribute from the list, then click on a button to select
Increasing or Decreasing order. The None button disables ordering.
You can type in the values for "Label" and "Width" fields; use the pull-down
list for" Attribute" and "Type".
You can reset to the default field widths with the Default button.
Select Short View/Sort/Filter Labels from the Options menu. For example, the
"long" labels would appear as follows:
View by User (root) Sort(Pid)
The" short" labels exclude the values in parentheses.
153
Administering seQ systems
In the Process Manager (page 151), select the process you wish to reprioritize
from the list and select Priority from the Process menu.
Click on the Raise or Lower Priority buttons and enter an increment, if desired.
Signalling a process
In the Process Manager (page 151), select the desired process from the list and
select Signal from the Process menu. The most commonly used signal is
KILL, used to terminate a process.
The remaining functions are intended for more sophisticated users. See
signal{S) for more information.
155
Administering seQ systems
Troubleshooting SCOadmin
This section addresses problems with running SCOadmin:
• "SCOadmin will not start" (this page)
• "Recovering from SCOadmin failures in character mode" (this page)
• "Remote administration problems" (this page)
• "SCOadmin error trace" (page 157)
• "The SCOadmin event log" (page 158)
See also:
• "Enabling remote manager capabilities" in the Networking Guide
• "Troubleshooting network configuration" (page 494)
• "Troubleshooting TCP lIP" in the Networking Guide
while executing
"SMUXlnit hostmib /etc/sysadm.d/hostmib.defs"
("uplevel" body line 3)
invoked from within
"uplevel $command"
157
Administering seQ systems
I NOTE Do not confuse messages contained in the SCOadmin event log with
the system error messages located in /usr/adm/messages.
See also:
• "Understanding the SCOadmin event log" (this page)
• "Using the SCOadmin Event Logs Manager" (page 159)
Here is an example:
Jul 12 22:27:38 apathy syslog: SCOADM: localhost {sco_printer}
{toaster1} objectCreation SCO_OFACE_MSG_OBJECT_CREATION {object
creation {(null)}}
You can modify the list of event types by editing the /usr/adm/events file.
Using the SCOadmin Event Logs Manager
You can select events to be logged using the SCOadmin Event Logs Manager
located in the System/Logs directory of the SCOadmin hierarchy. The SCOad-
min Event Logs Manager displays the events currently logged and not
logged.
To log an event, highlight it in the Hlgnored Events" column and click on the
Log event button.
See also:
• "The SCOadmin event log" (page 158)
• "Understanding the SCOadmin event log" (page 158)
Educating users
The following list suggests points the system administrator can explain to
users so they can take advantage of the system's resources without overload-
ing the system or causing unnecessary system problems. The more users
understand the system and its limits, the less demands are placed on the sys-
tem administrator.
159
Administering seQ systems
• How to edit files. Make sure users know basic editing commands.
Character: flUsing the vi editor" in the Operating System Tutorial
Graphical: Chapter 1, flCreating files with Edit" in Using Edit
• How to use the calendar program. Show users how to organize their
schedules with the calendar.
Character: flUsing the Calendar" in the Operating System User's Guide
Graphical: flUsing the Graphical Calendar" in Using the Graphical Calendar
• How to print files. Explain the print commands for most-used programs.
Tell the user the location of the default print service printer. Demonstrate
how to replenish paper and toner, tape, or ribbon cartridge. Refer the user
to the printer documentation, if necessary.
Character: flPrinting files" in the Operating System User's Guide
Graphical: Chapter 13, flPrinting files" in Using the Desktop
• How to use the undelete feature to restore files. Explain the filesystem
versioning feature. Show users how to version files and recover them with
undelete( C).
Character: "Retrieving deleted files" in the Operating System User's Guide
Graphical: Chapter 12, "Deleting and recovering files and directories" in
Using the Desktop
• Good mail etiquette. Explain how to read and send mail, how to read
through mail lists, and how to organize messages into mailboxes or folders.
Explain how to clean out unwanted messages by deleting or saving them to
floppy or tape. Emphasize the importance of maintaining free disk space.
Character: Chapter 2, "Using e-mail" in the Mail and Messaging Guide
Graphical: "Using Mail" in Using Mail
• Good filesystem planning. Explain the limits of directory size. For best
performance, login and working directories should have less than 64*
entries, including the dot (.) and dot-dot (.. ) entries, and data storage direc-
tories should have less than 638* entries. Warn users that directories do not
get smaller, even if files are removed. Discourage users from saving mail
messages in separate files rather than appending them to existing mailbox
files. Refer to "Maintaining file system efficiency" in the System Administra-
tion Guide for more information.
• How to store (archive) files. Show users how to use floppy disk and tape
archiving facilities to store unused files or directories.
Character: Chapter 7, "Working with disks, tapes, and CD-ROMs" in the
Operating System User's Guide
Graphical: "Using floppy disks" in Using the Desktop
• How to reset a scrambled serial terminal. Teach users with serial termi-
nals how to escape from the most-used programs and how to reset a termi-
nal with tset( C) and stty sane. Tell users how to turn the terminal on and off
if necessary. Make sure users try these procedures before asking a system
administrator to disable and reenable the scrambled terminal. See "Fixing
scrambled terminal display" (page 448).
161
Administering seQ systems
If growth is expected, plan for it. Make sure that the resources and the com-
munications lines that connect them are adequate for expected growth.
• Allow for sufficient disk space in the filesystem where home directories are
located. By default, home directories are located in the root filesystem. If
possible, place home directories outside the root filesystem.
• Organize users into workgroups so they can share files. See "Managing
groups" in the System Administration Guide.
• If you need to create large numbers of user accounts at the outset, use the
useradd(ADM) command and template files. See "Using account tem-
plates" in the System Administration Guide.
• Assign advanced authorizations and privileges only to designated adminis-
trators or trustworthy users. See" Assigning subsystem authorizations" in
the System Administration Guide.
• Versioning (which makes it possible to recover deleted files) is disabled by
default. Consider whether you want to enable this feature and administer
it accordingly. See "Versioning file systems (undelete)" in the System
Administration Guide for more information.
Network considerations
Hardware considerations
• Set up the computers in a place where they will not be bumped or moved
at any time. If possible, they should be in a room by themselves, with little
or no foot traffic. If workstations are used for data storage, at least place
them on stable furniture and leave no cables exposed to traffic.
• Keep the computer room cool and give each machine excellent ventilation.
Keep all machines away from walls and, if possible, provide a separate air
conditioner for the computer room, with more-than-adequate cooling capa-
bility.
• Install a Halon® fire extinguishing system in the computer room rather
than sprinklers.
• Store backup media in a separate room from the computers. This room
should be fireproof, or and / or have a Halon fire extinguishing system
(rather than a sprinkler system).
• Ensure that there is adequate and uninterrupted power for the computers
(or at least surge protection). Installing an uninterruptible power source
(UPS) will prevent system crashes caused by small electrical failures and
may provide enough power for an orderly shutdown following major
electrical failures. This is especially important if your building frequently
suffers power glitches or if you live in an area that is subject to frequent
major storms. The computers should also be on an isolated, fully grounded
(earthed) circuit.
• If you install a local area network, plan the cabling and location of all
machines and peripherals carefully. Seek the assistance of a networking
expert to make these plans. Good planning and the use of adequate con-
necting media and compatible hardware are essential for long-term
network performance.
163
Administering sea systems
• If you need leased lines for off-site connections, arrange for these with your
local telephone company.
• If you plan to connect a printer to a parallel port, locate it close to the
machine running it. Keep the machine out of the path of traffic to and from
the printer.
• If you connect terminals, printers, or other peripherals to serial ports, con-
sider using phone-line cabling and switching hardware, especially if your
system is expected to grow in size and complexity. You can readily adapt
phone lines for serial hardware, and telephone connecting and switching
technology is mature and flexible.
165
Administering seQ systems
(Continued)
167
Administering seQ systems
169
Starting and stopping the system
NOTE The default system behavior is to restart and proceed with these
stages without intervention when the computer is switched on (or power is
restored). See "Changing the system restart options" (page 182) for more in-
formation.
See also:
• "The UNIX system life cycle" in the Operating System User's Guide
2. Press the (Enter) key. The system loads the operating system using the
default bootstring as described in "Changing the startup process" (page
182).
Cleaning filesystems
The root filesystem must be "cleaned" (checked and cleared of any incon-
sistencies) using fsck(ADM) if the following message is displayed:
fsstat: root filesystem needs checking
OK to check the root filesystem (/dev/root) (yin)?
This message is displayed only if the system was not shut down properly, as
described in "Stopping the system" (page 178). Your additional filesystems
may also require cleaning.
To clean the file system, enter y (for "yes") and press the <Enter) key. fsck
cleans the filesystem, repairing damaged files or deleting files that cannot be
repaired. It reports on its progress as each step is completed. At some point,
you may be asked if you wish to salvage a file. Always answer by entering y
or n and pressing the <Enter) key. You can also enter y! and yes answers will
be assumed for all succeeding prompts. For an explanation of how fsck
works, refer to "Filesystem check phases (HTFS, EAFS, AFS, S51K)" in the Sys-
tem Administration Guide.
There are two cases where cleaning will be skipped (or shortened consider-
ably):
Intent logging If "intent logging" is enabled on the file system, it is
unlikely that cleaning will be necessary; fsck will not be
invoked in this case. If any cleaning is necessary, a "fast
fsck" will be performed that replays the transaction log for
the filesystem. This process lasts several seconds (instead
of minutes). See "Logging filesystem transactions" in the
System Administration Guide for more information.
DTFS file systems DTFS file systems are extremely stable and normally do not
require cleaning. When cleaning is necessary, no interven-
tion is needed. See "Filesystem check phases (DTFS)" in
the System Administration Guide for more information. In
some cases, a DTFS root filesystem will be rebooted after
checking if many changes had to be made to repair the file-
system.
When cleaning is complete, the system asks you to choose the mode of
operation.
171
Starting and stopping the system
I
NOTE The superuser (root) password is assigned during system installation.
If you do not know the root password, ask the administrator who installed
your system.
Single-user mode
Use system maintenance mode only if you must do system maintenance work
that requires all other users to be off the system, including checking file-
systems, installing updates or new software, and reinstalling system files or
packages. Note that many system services (like printing and networking) will
not function because the various daemons and startup programs in /etc/rc are
not executed. Single-user mode effectively halts the startup process until you
exit using (Ctrl)D, when the process continues with setting the system time.
While in single-user mode, the superuser prompt" #" is displayed.
I NOTE You cart also configure the system to skip the single-user mode
prompt. See "Changing the startup process" (page 182).
Multiuser mode
When you select multiuser mode, the startup process continues, proceeding
with setting the system time. The most important distinction between single-
user and multiuser mode is the execution of startup commands found in the
/etc/rc directories discussed in "Changing scripts in /etc/rc2.d" in the System
Administration Guide. These scripts generate startup messages for the various
system services, such as the printer or network services. Next, the system dis-
plays the login: prompt and users are allowed to log in.
For example, to change the time and date to 3 February 1995 at noon, enter:
9502031200
After accepting the new value, the system then displays the new time and
date:
Sun Feb 03 12:00:00 PST 1995
If you enter an incorrect value, the system prompts you to try again. If you do
not enter an optional value, the current value for that item remains
unchanged. If you type a new value for the year, you must also type values
for the month and day. Similarly, if you type a new value for the month, you
must type a value for the day.
173
Starting and stopping the system
The time and date display is followed by service startup messages and the
login: message.
Enter numbers manually (or use the up and down buttons in the graphical
version) to set the time and date entries. Note that hours are expressed in 24-
hour format, in which morning hours range from 00 to 11 and evening hours
from 12 to 23.
NOTE If you need to set the system clock back, reboot the system and enter
To change your time zone, see "Changing the system time zone" (this page).
NOTE Any users logged in (including root) during the timezone change
operation will not see the change until they log out and log in again. This is
because the timezone variable (located in /etc/TIMEZONE) is read at login
time. .
175
Starting and stopping the system
This is done because the" -t" file is the modified version of the original file
and could have been damaged; it is likely that this file does not contain all
the entries of the original. This message is repeated for all files found in
that state in the specified directories. (The" -d' files are not suspect
because they are the original versions of the files renamed prior to updat-
ing.)
2. tcbck checks that key system files are present and that they are not empty.
If a file is missing (or empty), then a message similar to this is displayed:
letc/tcbck: file file is missing or zero length
This process is repeated for each of these files (critical TCB files are marked
with at):
/ete/auth/system/default t
/ete/auth/system/files
/ete/auth/system/devassign
/ete/auth/system/authorize t
/tcb/files/auth/r/root t
Jete/group
/ete/passwd t
When this process is complete, if any files were missing, or empty" -t" files
were substituted for real files, this message is displayed:
letc/smmck: restore missing files from backup or distribution.
If either /ete/passwd or Jete/group is missing, this message is displayed:
letc/tcbck: either slash (I) is missing fran letc/auth/system!files or there
are malfonred entries in letc/passwd or letc/group
3. If critical database files are missing or corrupted, then the system enters
maintenance mode automatically without asking for the root password.
These messages are displayed:
INIT: SINGLE USER MODE
Security databases are corrupt.
Starting root shell on console to allow repairs.
Entering System Maintenance Mode
If no critical database files are missing, you are prompted to choose sys-
tem maintenance mode or normal operation. If files are reported missing,
write them down and follow the instructions in "Restoring critical security
database files" (page 186).
177
Starting and stopping the system
You may see that many discrepancies are reported and repaired by this
process - this is normal.
NOTE If the system is set to restart automatically when an operator is
not present (" AUTOBOOT=YES" appears in fete/default/boot), then
authck(ADM) is called noninteractively. Warnings are displayed about
inconsistencies found but authck is not given the opportunity to fix
them. The transition to the multiuser operation then proceeds as nor-
mal.
See "Database consistency checking: authck(ADM) and
addxusers(ADM)" in the System Administration Guide for information on
running authck manually.
7. You see this message:
Checking ttys database
ttyupd(ADM) is run to ensure that all ttys in /ete/inittab have entries in the
Terminal Control database (/ete/auth/system/ttys).
8. The system should be up and ready for logins. If any files were reported
missing, you must now log in on the override terminal to restore them, fol-
lowing the same procedure outlined earlier. By default, the override ter-
minal is defined as ttyOl, also known as the first multiscreen. If you
removed the default entry in fete/default/login, you will have to shut the
system off, reboot and enter single-user mode, and restore the files that
way. When you log in on the override tty, this message is displayed:
The security databases are corrupt.
However, root login at terminal ttyOl is allowed.
To shut down the system, select Begin Shutdown from the Shutdown menu.
The default behavior is to send the default broadcast message to all users and
shut the system down in 60 seconds.
To change the grace period, enter your changes in the "Delay" field. If you set
the "Delay" to 0, the "Message" field cannot be filled in and no message will be
sent because the shutdown will be immediate.
To change the broadcast message, enter the text in the "Message" field, or
select Read from file from the Message menu to use a prepared file.
179
Starting and stopping the system
To stop the system with the haltsys command, log in as the superuser and
enter:
/etc/haltsys
The system displays the message:
** Safe to Power Off **
-or-
** Press Any Key to Reboot **
Turn off the computer, or press any key to reboot the system.
To log in as the superuser, you must know the superuser password. If you do
not know the root password, ask the administrator who installed your system.
You also need to see the login: message on the screen. If you are using a
character-based display and do not see this message, press (Ctrl)D until it
appears.
WARNING Take special care when you are logged in as the superuser. In
particular, you should be careful when deleting or modifying files or direc-
tories. This is important because the superuser has unlimited access to all
files, and it is possible to remove or modify a file that is vital to the system.
Avoid using wildcard designators in filenames and keep track of your
current working directory.
2. Enter the superuser password when prompted. The system does not dis-
play the password as you enter it, so enter each keystroke carefully.
The system opens the superuser account. If you are using a graphical display,
you see the Desktop of the root account. If you have logged in to a character-
based display, you see the superuser prompt" #". You can exit at any time by
pressing (Ctrl)D.
Key:
cpu/ cpuid The CPU type(s), stepping, and vendor information.
device name of the hardware
address address in hexadecimal
vector interrupt vector
dma direct memory access channel
comment other details about the hardware
fpu floating-point unit present (Intel 80387 math coprocessor, 80486
CPU and Pentium chips)
floppy high density S.2S-inch floppy disk drive (type=96dslS)
serial this is COMI with one port (nports=l, no multiport card is
installed)
parallel this is parallel port IpO (unit=O)
181
Starting and stopping the system
console the console has an EGA video adapter (unit=ega) compatible with
type 0 (IBM EGA), with 12 multiscreens that take up 68KB of kernel
space
disk Western Digital st506 controller number 0 (WO), hard drive 0 (unit
0), as well as the number of cylinders, heads, and sectors
adapter Adaptec AHA-174x host adapter. See "Boot time messages from
host adapter drivers" (page 306) for more information.
Due to the wide variety of hardware devices available, you may see addi-
tional device entries not discussed here.
The hwconfig utility can display or access this information at any time, using
the configuration information stored in the file jusr/adm/hwconjig. Refer to the
hwconfig( C) manual page for more information.
In addition, the eisa(ADM) utility can be used to list the cards installed in EISA
machines, and the slot( C) utility used for MCA machines.
See also:
• boot(F) manual page
• "Changing the default bootstring (DEFBOOTSTR)" (page 183)
The restart options determine whether (and how) the system will restart after
a power failure or system panic.
To restore system defaults, select Reset Defaults from the Parameters menu.
183
Starting and stopping the system
If you are performing an installation and your system fails to boot see Chapter
3, "Troubleshooting the installation" (page 53).
Many of the problems discussed here relate to missing system files. "About
missing or corrupted system files" (page 185) explains what you need to
restore files.
To boot and access a system that does not boot from the hard disk, you must
have an emergency boot floppy disk set (page 81). This set consists of the
boot floppy disk and the root file system floppy disk. The boot floppy disk
contains three files necessary for booting and loading the UNIX system kernel:
/boot, jete/default/boot, and /unix. The root filesystem floppy disk contains a
subset of the UNIX system utilities that you can use to restore your system.
185
Starting and stopping the system
If a catastrophic failure occurs and you do not also have a backup of the root
file system, you must reinstall your sca system. To do this, follow the instruc-
tions for reinitializing the root disk in "Replacing the root hard disk" (page
339).
See also:
• "Checking the security databases" (page 175)
• "Restoring a corrupted root filesystem" (page 250)
NOTE If the files jete/passwd or jete/group are missing from the system,
the custom command will fail. (For jete/group, the command will take a
very long time to complete.) If it does, use one of these commands to
restore the symbolic link manually:
In -s /var/opt/K/SCO/Unix/* /etc/passwd jetc/passwd
In -s /var/opt/K/SCO/Unix/* /etc/group /etc/group
NOTE The original distribution files will not contain any changes you
have made to your system - you will have to add them again. For
example, groups added to fete/group or users in /ete/passwd. For
/ete/passwd, you can use the Protected Password database entries to get the
information:
cd /tcb/files/auth
grep u_id * /*
This lists all the accounts on the system and their UIDs (u_id). Ignore the
system accounts like root and bin. The remaining accounts can be added
by editing /ete/passwd manually, or by running the Account Manager and
adding the users (making sure to enter the correct UID and use the exist-
ing home directories instead of creating new ones).
4. Repeat step 1 to make sure all the symbolic links are intact. If the system
is still in single-user mode, enter (Ctrl)D and continue with system startup
as described in "Checking the security databases", step 4 (page 177). If
you are already in multiuser mode, run this command to repair any
remaining inconsistencies:
authck -a -y
187
Starting and stopping the system
If the system fails to boot or you see the NO OS message, the blocks containing
the partition boot blocks (/etc/hdOboot and letc/hdlboot) or masterboot block
(/etc/masterboot) may have been corrupted. To restore them:
1. Insert the boot floppy from your emergency boot floppy set and boot from
it. When the Boot: prompt appears, enter:
hd(40)unix
2. Enter single user mode and enter these commands at the root prompt:
instbb hd I dev IhdOa
dparam -w
instbb(ADM) writes the partition boot blocks to the hard disk.
dparam(ADM) writes the masterboot code to the masterboot block on the
hard disk.
For some disks it may also be necessary to stamp the disk geometry as
described in dparam(ADM).
If your system displays this message when you turn on the power to your
computer, the Iboot file is missing:
boot not found
Cannot open
Stage 1 boot failure: error loading hd(40)/boot
This refers to the boot(HW) program, which loads and executes the kernel
each time you turn on the computer.
If Iboot is missing, use this procedure to boot the system from the emergency
boot floppy disk set so that you can then restore the file:
1. Insert the boot floppy disk in the drive and reboot the machine. This exe-
cutes the initial boot from the boot floppy disk.
2. At the Boot: prompt, enter:
fd(60)unix.Z root=hd(42)
This command boots the system from the floppy disk, loads the the kernel
from the floppy disk, and mounts the root filesystem.
3. Bring up the system in single-user mode by entering the root password at
the prompt.
4. Unmount the Istand file system (where boot and the kernel are located):
umount Istand
The reason for this is that Istand is normally mounted read-only and you
must unmount it and mount it again before you can replace boot.
5. Re-mount Istand:
mount Istand
6. Now mount the boot floppy disk:
mount -r Idev/fdO Imnt
7. While the floppy disk is in the drive, restore the Iboot file by entering this
command at the system prompt:
cp Imnt/boot Istand
This places a new copy of the Iboot file on the hard disk.
8. Before you remove the floppy disk from the drive, unmount the boot
floppy disk (Jdev/jdO) by entering:
umount Imnt
9. Remove the floppy disk from the drive and bring down the system using
haltsys(ADM).
10. Reboot the system from the hard disk by pressing (Enter) at the Boot:
prompt.
unix not found
If the system displays the unix not found message after the system starts to
boot, the unix file is missing. The unix file contains the bootable image of the
UNIX system kernel. If unix is missing, you can boot from another kernel file,
(such as unix.old or unix.safe) by entering the alternate kernel name at the
Boot: prompt.
If there are no other kernel files on the system, boot the system from the emer-
gency boot floppy disk set so that you can restore the unix file:
1. Insert the boot floppy disk in the drive and reboot the machine.
2. At the Boot: prompt, enter:
fd(60)unix.Z root=hd(42) swap=hd(41)
This loads the kernel from the boot floppy disk and mounts the root file-
system on the hard disk.
I NOTE If you have changed the location of the swap device, you should
substitute it for hd(41).
3. Bring up the system in single-user mode by entering the root password at
the prompt.
4. Unmount the Istand file system (where boot and the kernel are located):
umount Istand
The reason for this is that Istand is normally mounted read-only and you
must unmount it and mount it again before you can replace the kernel.
189
Starting and stopping the system
5. Re-mount /stand:
mount /stand
6. Mount the boot floppy disk:
mount -r /dev/fdO /mnt
7. While the floppy disk is in the drive, restore unix:
cp /mnt/unix.Z Istand
This copies the compressed unix kernel file from the boot floppy disk to
the hard disk. You do not need to uncompress the kernel.
8. Before you remove the floppy disk from the drive, unmount the floppy
disk (Jdev/fdO):
umount Imnt
9. Remove the floppy disk from the drive and bring down the system with
the haltsys(ADM) command.
10. Reboot the system by pressing (Enter) at the Boot: prompt.
11. The kernel you loaded from the boot disk does not include any changes
you've made since creating your emergency boot floppy disk set. You
should immediately relink your kernel as described in "Relinking the ker-
nel" (page 290). Whenever you make changes to your system configura-
tion that add drivers and relink your kernel, you should create a new
emergency boot floppy disk set.
Cannot load floating point emulator
If your computer does not have a 387 math coprocessor chip and the
Jete/emulator file is missing or corrupted, the boot fails with these messages:
WARNING: Cannot load floating point emulator (error 2): jete/emulator
No floating point is available
(If the 387 chip is present, the kernel recognizes it in the hardware recognition
boot message.)
If the boot fails with this message, boot the system and restore Jete/emulator:
1. Insert the boot floppy disk in the drive and reboot the machine.
2. At the Boot: prompt, press (Enter) and when instructed, insert the root
floppy disk. This boots the system and mounts the root filesystem from
the floppies.
3. Clean the root filesystem:
fsck -ofull /dev/hdOroot
4. Working from the floppy disk, use this command to mount the hard disk
root file system to /mnt:
jete/mount /dev/hdOroot /mnt
If mount fails, refer to "Checking and repairing file systems" in the System
Administration Guide for information on checking the hard disk with
fsek(ADM).
5. Copy jete/emulator from the root filesystem on the floppy disk to the
mounted hard disk:
ep fete/emulator /mnt/ete/emulator
6. Unmount the hard disk:
/ete/umount /mnt
7. Make sure that the floppy disk is still in the drive, then reboot the system
with the haltsys(ADM) command.
8. When you see the Press any key prompt, remove the floppy disk from
the drive. Press (Enter) at the Boot: prompt to boot from the hard disk.
If the system boots correctly but hangs at the login prompt after you enter
multiuser mode, try other multiscreens or serial terminals. If you cannot get a
response from any tty, the /hin/login file may be missing. The /hin/login file is
the login(M) program. This command is run at the beginning of each terminal
session to allow users access to the system. To restore /bin/login:
1. Power-cycle the machine and press (Enter) at the Boot: prompt.
2. When prompted, enter the root password to go into single-user mode.
3. Use the Backup Manager as described in "Restoring files from a scheduled
file system backup" in the System Administration Guide to restore the
/bin/login file from your root file system backup. You can also restore the
file from the command line by inserting the first volume of your last full
backup of the root filesystem into the tape drive and entering:
cd /
epio -idv -I /dev/rctO bin/login
The default tape device is linked to /dev/rctO. If you are using a different
device (such as /dev/rctmini), substitute it for /dev/rctO.
191
Starting and stopping the system
193
Starting and stopping the system
195
Starting and stopping the system
I NOTE If you are in single-user mode, you cannot use other terminals and
the hard disk access light may not flash.
If it flashes periodically (at least once every 30 seconds), the system is still
running and is using the hard disk.
I NOTE This patch disables the keyboard lights, so you should use it only if
you have tried the other approaches.
To prevent console keyboard lockup:
1. Get the system console working, if it is not. If necessary, reboot the sys-
tem and bring it up in single-user mode by entering the root password at
the Boot: prompt.
If you did not reboot, log in as root on the system console and shut the sys-
tem down to single-user mode with the shutdown(ADM) command:
fete/shutdown su
197
Starting and stopping the system
However, you can choose to turn the scologin client off and start the X server
manually, or you can run an additional server session on another multiscreen
manually. To run the X server manually, run the startx script.
199
Customizing startup of the Graphical Environment
Regardless of the method you use to actually run the X server, a default
Graphical Environment session is controlled by the session management
client, scosession. scosession defines the clients that are run when you start
the server and controls their appearance and behavior.
See also:
• "Running scologin" (this page)
• "Running the startx script" (page 202)
• "Using the session manager" (page 205).
The above sections assume that you are using clients in their default configu-
ration.
Running scologin
The scologin display manager provides graphical login windows to local and
remote X servers, as well as services that are similar to those provided by log-
in or getty. In particular, scologin:
• keeps the X server running
• prompts for user login and password
• authenticates users
• requests new passwords when appropriate
• establishes secure Graphical Environment sessions
session scripts".
See also:
• "Configuring scologin's startup behavior" (this page)
• "Defining X server sessions" (this page)
• "Logging out of scologin" (page 202)
I NOTE This script is run as root and as such, should be written with security
issues in mind.
This script does not execute any commands by default - it is empty except
for a few comment statements. You can place shell commands in the file to
perform custom startup tasks, such as mounting users' home directories from
file servers, displaying the message of the day, setting custom shell environ-
ment variables, and so forth.
Once this script has been executed, scologin begins the user's session.
201
Customizing startup of the Graphical Environment
You can also use this script to undo the effects of commands that were exe-
cuted in the Xstartup script. For example, the Xreset script could unmount
directories from a file server that were mounted when the session was started.
If the startx script is executed with the -t option, as it is from the scologin
Xsession-SHELL file, the script does all of the tasks above, including modifying
the $PATH environment variable. However, the -t option does not set the
$DISPLAY environment variable or run xinit to start the X server. In the case
of the scologin display manager, it is unnecessary to start the server because
it is already running. The -t option is also useful if you want to run a Graphi-
cal Environment session on an X terminal, which uses its own internal server.
For more information on using the Graphical Environment with X terminals,
see "Using X terminals" (page 217).
NOTE If you run the startx script with the -t option, you must set the
$DISPLAY environment variable before you run startx. Otherwise, you see
the error message:
DISPLAY environment variable not set
The /usr/lib/Xll/sys.startxrc file specifies the clients and commands that are
run by default in X server sessions for all users on the system. Because the
default configuration uses the session manager to control Graphical Environ-
ment sessions, scosession is the only client that is run by the sys.startxrc file.
This file contains the following line:
exec scosession 2> Idev/null
The startx script also looks for a local .startxrc file, located in a user's home
directory. If a user wants to use the session manager, there is no need to put a
.startxrc file in $HOME. The sys.startxrc file is used to run scosession.
If, however, a user does not want to run scosession, a .startxrc file is needed in
$HOME to start the desired clients, particularly the window manager. The
.startxrc file is not placed in a user's home directory by default. To create this
file, copy /usr/lib/Xll/sys.startxrc to .startxrc in your home directory.
203
Customizing startup of the Graphical Environment
NOTE You are strongly urged to use scosession to control the clients you
want to run automatically in a Graphical Environment session, instead of
adding clients to either $HOME/.startxrc or /usr/lib/Xll/sys.startxrc. If you do
not use the session manager, you may accidentally overlook starting an
important element of the Graphical Environment, resulting in the loss of
some functionality.
See also:
• startx(X) manual page
• "Using the session manager" (page 205)
To prevent this problem, start the X server using this command line:
startx; /etc/clean_screen
If you log in using scologin, you should not encounter any problems.
scosession uses several files to determine its behavior. These files are located
in /usr/lib/Xll/sco/ScoSession, and are listed in Table 11-2, "scosession
configuration files".
205
Customizing startup of the Graphical Environment
The $HOME/.odtpref directory may contain other directories and files, depend-
ing on the clients you use and configure.
See also:
• "Starting scosession" (page 207)
• "Stopping scosession" (page 207)
• "Using scosession options" (page 208)
• scosession(XC) manual page
• xrdb(XC) manual page
Starting scosession
When scosession is started, the /usr/lib/Xll/sco/ScoSession/startup script is
read. This file sets up your Graphical Environment session. In particular, it:
• loads resources located in files in /usr/lib/Xll/sco/startup into the resource
database, using the xrdb command. The script also loads resources stored
in the file $HOME/.odtpref/ScoSession/xrdb.save. (For information on
resources and the resource database, see Chapter 5, NUnderstanding
resources" in the Graphical Environment Guide.) These resources reside in
the server and determine the basic appearance and behavior of many of the
clients you run.
• restores any state information from your previous session, including
mouse acceleration, threshold, mouse double-click interval, and left- or
right-handed button mapping preferences. This information is determined
by files located in $HOME/.odtprej
• reads the file $HOME/.odtpref/ScoSession/dynamic if you resume a previous
session or $HOME/.odtprej/ScoSession/static if you select the default session,
and starts all of the specified clients. If neither of these files are located,
scosession runs the clients indicated in /usr/lib/Xll/sco/ScoSession/static.
These files indicate not only the clients to run, but any special command
line options used to start the applications, their geometry (size and location
on the screen), the host machine from which the client can be accessed, and
whether or not the client should be run in an iconified or normal state.
• starts the window manager client that is specified by the
ScoSession*windowManager resource. By default, the SCO Panner win-
dow manager, an enhanced version of the OSF /Motif window manager, is
run. See Chapter 5, NUnderstanding resources" in the Graphical Environ-
ment Guide, for more information on resource specifications.
Stopping scosession
When you end your Graphical Environment session and either stop the X
server or log out of scologin, scosession runs the
/usr/lib/Xll/sco/ScoSession/shutdown file, which in turn calls
/usr/lib/Xll/sco/ScoSession/xrdbcomp. These perform the following:
• Remove the resource database from the RESOURCE_MANAGER property of
the Root window. Any resources that you merged into the resource data-
base during the session are stored in the file xrdb.save, located in
$HOME/.odtprej/ScoSession. These resources are also loaded into the
resource database the next time you run a Graphical Environment session.
(For more information on resources and the resource database, see Chapter
5, NUnderstanding resources" in the Graphical Environment Guide.)
207
Customizing startup of the Graphical Environment
• Note the state of clients left running when you ended your session and
save this information in $HOME/.odtprej/ScoSession/dynamic. These clients
are run in the same state for your next session, if you choose to resume the
previous session.
• Save all state information in the appropriate files in $HOME/.odtpref
• Shut down all running clients, including the window manager, in a con-
trolled manner.
See also:
• scosession(XC) manual page
NOTE If the $LANG variable is not set to the appropriate locale, you must
do so using the International Settings Manager (page 221). For more infor-
I mation, see Chapter 12, ilSpecifying the locale" (page 221).
The $PATH and $HOME environment variables are actually set when you first
log in, whether through a multi screen running getty or through scologin.
However, the X server modifies the $PATH variable to include the /usr/bin/Xll
directory.
where:
hostname specifies the name of the machine to which the display is
connected, and must be either a machine name or the
machine's network address. If the hostname is not
specified, the client assumes it should communicate with
the display on the same machine.
:display_number specifies the number of the display, or X server, that you
want the client to use. Each display on a system is
assigned a :display_number. If the display is managed
by scologin, the :display_number is specified explicitly in
the /usr/lib/Xll/sco[ogin/Xservers file. If the X server is
started by startx, the server is assigned the first available
:display_number, starting with ":0".
Usually, if only one X server is running, its :dis-
play_number is ":0". If more than one server is running
on your system, you must determine which display
number corresponds to the X server you want to specify.
screen_number specifies the screen on which the server is running.
The default display name is stored in the $DISPLAY environment variable
when the X server is started by either scologin or the startx script. How-
ever, if you want a client to use a different display, you must reset the
$DISPLAY variable so it specifies the other server.
209
Customizing startup of the Graphical Environment
NOTE Most clients understand the -display command line option. This
option temporarily overrides the contents of the $DISPLAY variable. For
more information on using this command line option, see Chapter 5,
"Understanding resources" in the Graphical Environment Guide.
Customizing scologin
The default configuration of scologin runs the X server, and the scologin
client, on the second multiscreen (jdev/tty02) of the console. You can change
this configuration so that scologin does not run at all, or you can specify that
scologin manage multiple displays, on your system or on remote systems,
including X terminals.
There are several files that are used to configure scologin's behavior. These
files are all located in /usr/lib/Xll/scologin and are listed in Table 11-4, "scolo-
gin configuration files".
See also:
• "Using the scologin administration script" (this page)
• "Configuring scologin on multiple displays" (this page)
• "Using X terminals" (page 217)
There are six options that you can use with this script:
start starts the scologin process, which in turn reads the files Xconfig,
Xservers, and Xresources, all located in /usr/lib/Xll/scoiogin
stop stops the scologin process. Run scologin stop to halt all current
sessions managed by scologin. For example, use the stop option if
you want to reclaim scologin-managed ttys and restore getty pro-
cesses.
NOTE This option shuts down all scologin processes on your sys-
tem, which results in the closure of any sessions running at the
time you run the script. You should notify users before you run
this script.
211
Customizing startup of the Graphical Environment
There are two ways to specify the X servers that you want managed by
scologin:
• If the server supports the X Consortium standard X Display Manager Con-
trol Protocol, also known as XDMCP, you can usually specify the name or
network address of a remote machine running scologin at the server.
XDMCP is a dynamic mechanism whereby connections are made when
requested by a display, such as a workstation or an X terminal, that can
communicate through the protocol. The sca X server (Xsco) supports
XDMCP.
• If you want to configure scologin to run on a set of console ttys (for exam-
ple, on ttyOl through tty12), or if you want scologin to manage an X server
that does not support XDMCP, you can add an entry for each of the displays
in the /usr/lib/Xll/scologin/Xservers file. Each line in this file specifies a dis-
play that should constantly be managed by scologin.
See also:
• "About XDMCP X server options" (this page) for a list of the X server options for
usingXDMCP
• "Running scologin with XDMCP" (page 213) for information on running scologin
on remote systems using XDMCP
• "Running scologin with the Xservers file" (page 214) for information on manually
configuring scologin sessions
• "Using X terminals" (page 217) for information on managing an X terminal's dis-
play with scologin
The sca X server (Xsco) uses the following options to determine how it uses
XDMCP:
-broadcast enables XDMCP and broadcasts BroadcastQuery
packets to the network. The first responding display
manager is chosen for the session.
-class display_class sets the value of the additional XDMCP display
qualifier, which is used in resource lookup for dis-
play-specific options. By default, the value is HMIT-
Unspecified" .
-cookie xdm-auth-bits sets the value of a private key shared between the X
server and the manager, which is used when testing
XDM-AUTHENTICATION-l
-displayID display-id allows the display manager to identify each display
so that it can locate the shared key
-indirect host_name enables XDMCP and sends IndirectQuery packets to
the specified host
-once exits the X server after the first session is over. N or-
mally, the X server keeps starting sessions, one after
the other.
-port port_num specifies an alternate port number for XDMCP pack-
ets. It must be specified before any -query,
-broadcast or -indirect options.
-query host-name enables XDMCP and sends Query packets to the
specified host
See also:
• Xsco(X) manual page for a complete list of X server options
This broadcasts to all machines on the network for a scologin session. The
session is provided by the first machine on the network to answer.
You can also request a session from a specific machine with this command:
/usr/bin/Xll/Xsco -query hostname -once
213
Customizing startup of the Graphical Environment
To configure scologin to manage multiple displays using the Xservers file, use
the following procedure. You must be logged onto the system as root. For in-
formation on each of the steps in this list, see the sections immediately follow-
ing the procedure.
1. Use the scologin administration script to stop scologin, if it is currently
running on your system.
/etc/scologin stop
2. On the host machine where you want to run scologin, add the servers you
want to manage to the /usr/lib/Xll/scologin/Xservers file. Use the following
format when making entries in this file:
display_name [display_class] display_type [startup_command]
The scologin display manager should now be running on all of the displays
you configured.
NOTE This script shuts down all scologin processes on your system, which
215
Customizing startup of the Graphical Environment
For example, to manage a local display on /dev/tty03 that is not yet running
and a display on another sea system named scooter, include the following
lines in the /usr/lib/XII/sco[ogin/Xservers file:
:0 local /usr/bin/Xll/X :0 -crt /dev/tty03
2 scooter:l foreign
The scooter: 1 foreign entry indicates that you want scologin to manage the
second X server running on the remote machine, scooter.
If you want scologin to manage a remote display that is running the X server,
you must enable the server to provide access to your host machine. On the
system where the display is to be managed, edit the /etc/Xn.hosts file, where n
represents the display number you want to use. Add the name of the host
machine where scologin will be running.
For example, to gain access to the scooter:l display, include the name of the
scologin host machine in the /ete/XI.hosts file on scooter.
To enable scologin to manage a remote display, you must first start the X
server on the desired screen of the display where you want the scologin win-
dow to appear:
/usr/bin/Xll/X :display_number
For example, for scologin to manage a second X server on the fourth mul-
tiscreen on the machine scooter, you would log in on scooter's /dev/tty04 and
run:
/usr/bin/Xll/X :1
Using X terminals
You can use X terminals to run Graphical Environment sessions. In fact, you
can configure your X terminal so the scologin display manager automatically
manages the X terminal's display. When you log in through the scologin win-
dow, you start a Graphical Environment session, running on the host machine
and displaying on the X terminal.
Many X terminals can use the X Display Manager Control Protocol (XDMCP)
to facilitate the connection to remote hosts through scologin. From a user's
standpoint, the main advantage of XDMCP is that it allows you to turn an X
terminal off and instantly re-establish the connection to the scologin host ma-
chine when you turn the X terminal back on. When you turn on an X termi-
nal, scologin automatically displays a login window. The exchange of infor-
mation between the X terminal and the remote host is invisible to the user. In
fact, XDMCP and scologin are intended to make X terminals as easy to use as
traditional character terminals. With XDMCP, an X terminal basically requests
a connection to a remote host, is recognized by the host, and is sent a login
prompt by scologin.
If you are using X terminals at your site, the way you set up scologin depends
on whether or not the terminals can communicate through XDMCP. If a termi-
nal cannot communicate using XDMCP, you must include an entry for it in the
/usr/lib/Xll/sco[ogin/Xservers file and the terminal must be left powered on at
all times to maintain the connection to the host machine.
If an X terminal can communicate through the protocol, the machine that will
host the scologin process requires no configuration. However, the X terminal
must be configured to communicate with the host through the X terminal's
setup procedures, which vary from one model to another. Some X terminals
let you specify the address of a host machine from which you want to run the
display manager. Some X terminals can broadcast a request for a host over
the network and then display a list of all available hosts from which the user
can choose. Other X terminals can broadcast a request and merely accept the
first available host.
217
Customizing startup of the Graphical Environment
See also:
• "Managing an X terminal display with scologin" (this page)
• "Running a session on an X terminal without scologin" (page 220)
Once configured, you can log in directly to the machine running scologin
using the scologin window. The scosession manager is started, the Desktop
appears, and you can begin your session. If an .Xdefaults-hostname file exists
in your home directory on the host machine, clients you run use the resources
defined in this file.
These procedures assume that the X terminal has already been correctly con-
nected to the network and that the X terminal's name and IP address are
known to the machine that will host the scologin process. For information on
how to do this, refer to "Configuring TCP lIP" in the Networking Guide and to
the documentation supplied with your X terminal.
See also:
• "X terminals that do not support XDMCP" (this page)
• "X terminals that support XDMCP" (page 219)
See also:
• "Running scologin with the Xservers file" (page 214)
• "Using the scologin administration script" (page 211)
See also:
• The documentation supplied with your X terminal for more information on setting
display manager access
219
Customizing startup of the Graphical Environment
3. Run the startx script, using the -t option, to start the session:
startx -t &
4. The scosession client is started, the Desktop appears, and you can begin
your session.
See also:
• "Setting locales" (page 222)
• "Selecting codesets" (page 227)
• "Setting device character mapping" (page 230)
• "Creating a character mapping table" (page 232)
• "Enabling Euro currency symbol support" (page 244)
• the vidi(C) manual page
221
Specifying the locale
Setting locales
A locale is a name used to refer to a group of settings that influence the
behavior of the library routines used by programs to control the presentation
of dates, currency, time, printable characters, and other data that vary
between countries. By specifying a different locale, you can change the way
programs present country-specific information. See the locale(C) manual
page for more information.
NOTE After you change a locale (by using the International Settings Man-
ager or by setting the LANG environment variable), you must stop and res-
tart the xmvtcld daemon. scoadmin clients will not recognize the new
locale setting until you restart the server.
See also:
• "Localization of system software" (page 223)
• "Setting the system locale" (page 223)
• "Setting user locales" (page 224)
• " About locales" (page 224)
• "Selecting code sets" (page 227)
• "Setting device character mapping" (page 230)
The following components have not been translated: the kernel; the link-kit;
Installation Query Manager (IQM); supplied drivers (such as Xdrivers and
Network Drivers); layered products, such as the Development System and
SCO Merge ™ , the supplied NCSA Mosaic ™ (although scohelp is
internationalized/localized); mkdev scripts; boot; csh, sh (we recommend
that you use the POSIX shell (jbin/posix/sh) or ksh for localized messages).
No mkdev or kernel relink scripts are currently translated. When you turn
your system on, all system startup information up to the point where you
press (Ctrl)D to proceed with normal startup, (or give the root password for
system maintenance) will always appear in English.
The languages available depend on the codeset in use. If you want a language
that is not available using the current codeset, use the International Settings
Manager to select a code set that is compatible with your language. For exam-
ple, you must be using the IS08859-1 codeset in order to set the language to
German or French. You can set the language to American English in the
IS08859-1 codeset or the us ASCII codeset.
223
Specifying the locale
NOTE Vtcl ™ programs appear in English when run on a text screen even
though the system is configured for a different language.
To work around this problem, explicitly set the LANG environment variable
to the language desired. The Vtcl program will then display in the language
desired.
This problem does not occur when the Desktop is run because the Desktop
automatically sets the LANG environment variable.
In addition, the version of the C shell supplied cannot handle accented 8-bit
characters. Entering accented characters within a C shell will cause the con-
sole window to close.
Any subsequent logins by that user will take place using the new locale.
NOTE Unless you are logged in as root, you can change only your own
I locale. See HSetting the system locale".
About locales
The settings you can configure within a locale are:
collating sequence
The order in which a local character set is sorted. This is used by
the sort( c) command and by programs that use regular expres-
sions. See "Regular expressions and locales" (page 225).
currency format
The character used to denote a unit of currency and the format
used for printing monetary values.
character classification table
The table used to determine whether a given character is an upper-
or lowercase letter, a number, space, or some other class of sym-
bol.
time / date format
The format in which the time and date are presented.
number format
The format in which numbers are printed (whether groups of
digits are separated by a delimiter, and the type of delimiter to use
for decimals).
response strings
The standard strings to print in place of the English words "yes"
and lind'.
Because the locale in use governs the interpretation of data rather than its
representation, the same data might appear differently when presented under
a different locale. In particular, electronic mail might be affected when it is
sent from one locale to another; see "How mail translates between locales"
(page 226).
See also:
• the locale(M) manual page
• the locale( c) manual page
• the localedef( c) manual page
225
Specifying the locale
I NOTE Once you have changed the system keyboard setting, restart the X
server. (A simple way to do this is to log out and log back in.)
For example, a French keyboard and an American English keyboard may both
have the same physical layout, and the keys in any given position may return
the same codes, but the keycodes have different symbols ("glyphs", or print-
able characters) attached to them. The French keyboard returns different char-
acters than the American English keyboard.
The keyboard files listed in the main window of the International Settings
Manager specify the country-specific layouts of AT®- and PS/2®-style key-
boards. All the keyboard files are stored in /usr/lib/keyboard. These files map
the system keyboard to the given national standard. The keyboard file for a
particular national standard might need to be modified for a specific key-
board. If you need to modify the keyboard map, or create a new one, copy the
appropriate file in /usr/lib/keyboard to a new file in the same directory and
modify the new file. Name the file according to this convention:
keyboard_type.codeset.country
See also:
• the mapkey(M) manual page
Selecting codesets
seo provides console fonts for 1S08859-1 through 10, 1S08859-15, IBM
codepages 437, 850, 852, 860 and 865, and X fonts for 1S08859-1 and IBM 437,
850 and 858. To support, for example, 1S08859-2 under X and scoterm, you
must supply your own fonts.
The International Settings Manager allows you to specify both the codeset
used internally by the system (in other words, the way in which data is
represented when it is written to disk and manipulated by various programs)
and the codeset used on the system console.
When the system is run in single-user mode, the terminal type defaults to ansi.
This can cause characters to appear incorrectly (for example, letters may be
displayed instead of line drawing characters when scoadmin is run).
To solve this problem, if your console codeset is set to IBM850, issue this com-
mand immediately on entering single-user mode:
TERM=ansi-850 export TERM
If your console codeset is set to IBM860 or 1BM865, enter:
TERM=ansi_intl export TERM
227
Specifying the locale
NOTE Changing the internal system codeset will dynamically change the
list of the console codesets. The internal codeset is used as a primary
selection upon which the secondary codeset depends. Therefore, the default
console codeset might change if you change the internal system codeset
selection.
Changing the internal system codeset also changes the list of available
locales. It might also change the way that data previously in use on the sys-
tem is interpreted. After selecting the internal system codeset you should
review the device mappings and user locales under the Settings menu to
ensure that the mappings set up for each device are still appropriate and
that the language each user has selected is still supported by the system.
The system console is not actually a single device, but rather a combination of
both the console keyboard and the console monitor. Selecting the console
codeset will install a console font (see vidi( C», establish the list of available
system keyboard mapping files, and establish any additional mapping
required if the console codeset is not the same as the internal system codeset.
229
Specifying the locale
This specifies the mapchan(F) file to be used by the peripheral device (such as a
printer or terminal). The specified device now displays or prints all characters
sent to it in accordance with the selected mapchan(F) entry. See the mapchan(F)
manual page for a description of the functionality provided in the individual
map chan files.
I NOTE Any serial line which is used by the UUCP system should not have an
associated channel mapping.
See also:
• "Device mapping" (this page)
• "Creating a character mapping table" (page 232)
• the mapchan(M) manual page
Device mapping
Device mapping provides a method for ensuring that character input and out-
put devices (such as printers and terminals) connect to the system through a
standard codeset. When you select a device type from the "Select a device
type" list in the International Settings Manager, you are defining the map-
ping between the codeset supported by the external device and the internal
system codeset.
I~ _b] k~~~~~~
5:'''''1' 'IIII~" scancodes
%'ii to ~~ \:~
ibm
mapchan
Printer II :::~ I
!1!l1:)'~
231
Specifying the locale
mapchan files contain several divisions, each of which controls some aspect of
the mapping between the internal character set used by the system and the
character set used by the terminal or device. You might want to change one or
more of these divisions.
Alternatively, create a shell script for each program to switch mapchan off,
run the program, and then reset mapchan on exiting from the program.
If you have the IS08859-1 set as the internal character set, you need to map the
8-bit characters (characters with values greater than 127 decimal).
If you are using the IBM437 code set internally you need to map only the" §" .
symbol. This symbol is normally mapped into the Oxb2 instead, because it has
the same code as (Ctrl)u, which the system treats as a command to clear the
line. Configure map chan to translate this symbol back to the 8-bit PC code.
233
Specifying the locale
If you are simply mapping from an IS08859-1 character set to the IBM437 set,
typical characters are:
output
OxcO 'A' # use A since no A grave available
Oxc4 Ox8e # A umlaut
The mapchan files have been written so that the closest printable character is
used if a character is not available.
lar to compose sequences but are used for entering accented characters. Com-
pose sequences are more commonly used for entering non-standard charac-
ters.
Typical mappings for a dead key for caret characters using IS08859-1 are:
dead OxbO # declare the caret character
, a' Oxe2 # character for a with caret
, e' Oxea # character for e with caret
For details on the dead key section and a table of available dead key
sequences, see the mapchan(F) manual page.
Compose sequences are not the same as dead keys; a dead key produces no
output when you press it, but applies an accent to the next character you
enter. See "Mapping dead key sequences" (this page).
Compose sequences (and dead keys) are configured on terminals or the con-
sole using mapchan(M).
The supplied mapping files all use (CtrlL (" control underscore") as the charac-
ter to introduce a compose sequence. The PC console might also use the
(Alt)(SysReq) key to introduce a compose sequence. On keyboards with 12
function keys, the alternative compose key is the" *" symbol on the numeric
keypad.
The compose key section in the mapchan configuration file (like the dead key
section) declares the compose key, followed by a list of the characters to be
mapped. In all cases, two characters follow the compose key. For example,
mapping compose keys within the 7-bit range of characters common to the
ASCII, 1S08859-1, and IBM437 character sets:
compose Oxlf # compose key is A_
The control section of the mapchan file enables a specific number of charac-
ters to be ignored by mapchan when encountered as part of a terminal escape
sequence or function keystroke. The following control section shows some
typical sequences:
CONTROL
input
AA 1 # Function keys: AA followed by one character
\E # Function keys: Escape followed by one character
output
\Ea 4 # cursor control: Escape a and 4 other characters
\EG 1 # set attributes: Escape G and one character
For full details of the control section of the map chan file, see mapchan(F).
System changes such as keyboard and codeset changes made via the
International Settings Manager will affect the way scoterm behaves.
Here is a list of common scoterm problems that can be fixed via the
International Settings Manager:
Character-based applications with character line graphics do not look right
scoterm is running with the wrong font. Using the International Settings
Manager, reconfigure the console code set to either IBM850 or IBM437.
235
Specifying the locale
237
Specifying the locale
Table 12·1 French and German name equivalents for SCOadmin managers
English French German
Account Manager Gestionnaire de comptes Benutzer-Manager
utilisateurs
Address Allocation
Manager
Audit Manager Gestionnaire d' audits Audit-Manager
Backup Manager Gestionnaire de Backup-Manager
sauve gar des
Cron Manager Gestionnaire Cron Cron-Manager
DHCP Server
Manager
Filesystem Manager Gestionnaire de systemes Dateisystem-Manager
de fichiers
Floppy Filesystem Gestionnaire de systemes Dateisystem-Manager
Manager de fichiers sur disquette fUr Disketten
Hardware / Kernel Gestionnaire du materiel Hardware-/
Manager et dunoyau Kernel-Manager
HP Network Print Gestionnaire de service HP Netzwerk-
Services Manager d'impression Druckauftrags-Manager
de reseau HP
HP Network Printer Gestionnaire HP Netzwerk-
Manager d'impression de reseau Drucker-Manager
HP
International Settings Gestionnaire Internationale
Manager de configuration Einstellungen
internationale
Configuration
IPX Moniteur de IPX Konfigurations-
Monitor Configuration IPX monitor
License Manager Gestionnaire de licences Lizenzmanager
239
Specifying the locale
An 8-bit locale is any locale that contains characters not present in US-ASCII.
The MMDF mail system and scomail need to be configured properly for this to
work. If they are not configured correctly, the 8-bit characters will not display
properly at the receiving end.
The two kinds of data corruption that can be seen are as follows:
• The high-bit was stripped by an intermediate mail gateway
By default, MMDF strips the high-bit on outgoing mail and sendmail does
not, so if you are in a locale that uses any characters that are not present in
US English, you must enable 8-bit data in MMDF as follows:
1. In the file /usr/mmdf/mmdftailor, set the confstr parameter to
charset=8bit for the SMTP, badhost, and baduser channels (if present).
2. If the charset=7bit parameter is present or there is no charset parameter
(the default is 7bits), add a confstr parameter similar to the following to
your mmdftailor file:
confstr="charset=8bit, other confstr parameters"
Alternatively, the mmdf configuration utility generates an mmdftailor
file with the 7bit parameter present. In a file of that format, you must
change the H7" to an H8".
• 7-bit MIME encoded characters not displayed correctly in non-MIME
mailers
By default, scomail generates 7-bit MIME encoded characters which display
in a form similar to H=C7" on non-MIME mailers, such as mailx. To correct
this, set the X resource pass8bits to TRUE. This parameter can be found in
the file /usr/lib/Xll/%L/app-defaults/ScoMail.
Additionally, external mail generated by MIME mailers using the 7-bit
encoding will also cause this problem. The problem must be corrected at
the source or (preferably) you can use a MIME capable mailer (such as
scomail) to read the mail. However, it is recommended in 8-bit locales that
you always generate 8-bit data for new mail because that format is compa-
tible with most mailers.
Also, scomail will convert H=C7" style mail to 8-bit encoding on replies or
forwards when the message is included as text, but it will not convert them
to 8-bits when the message is included as an attachment.
Conversely, if scomail is configured to send mail in the 7-bit encoding
style, it will only convert 8-bit messages when the message is included as
text in the reply or forward operation.
• In general, non-MIME mailers send 8-bit data but do not include any MIME
headers to mark the message as 8-bit data. MIME mailers should cope with
this without any problems.
241
Specifying the locale
Calendars
• You can only administer the calendar database if the administration utili-
ties are running in the same locale in which database was created. If you
change your LANG variable, change the system locale using the Interna-
tional Settings Manager, or edit /etc!default/lang, you cannot administer the
calendar. Also, the calendar server will not start if the system locale has
been changed. If this is the case, you may see "Fatal Error' messages from
the calendar server when bringing up the machine in multiuser mode.
To work around this problem, you can start the calendar server with the
LANG variable temporarily defined as it was when the database was creat-
ed.
Typically, the calendar database is created at initial system load. To deter-
mine what LANG was set to during initial system load, examine the file
/usr/adm/ISL/iqmJile. Search for the variable IQM_LANGUAGE. This will
probably be the language that was used when the calendar database was
created.
If you find that you need to restart the calendar server with the initial
LANG setting, follow these steps as root:
1. Change directories (cd) to /usr/lib/sc%adb/caldata.
2. Remove all the data files in this directory; they will be rebuilt by cal-
build:
rm ./*
3. Enter cd /etc/rc2.d.
4. Edit the file P95calserver.
5. Go to line 20 (following the comments) and find the line:
OBKEY=6373i export OBKEY
Timezones
The start and end dates for daylight savings time (summer time) for all
timezones are correct at the time of publishing. However, European
timezones are being reviewed by the European Union and some of these start
and end dates might change. The correct algorithm for these dates can be set
in timezone.stz, which is located in /usr/lib/nls/msg/lang/sa, where lang is one of
the following directories: english, frenchJrance.8859, or german~ermany.8859.
To set the timezone rules for daylight savings time correctly, edit each of the
language specific timezone files (above) and change the following lines: in the
gmt" section from:
If
SUMMER_TOO =WETOWETDST,M3.5.0/1,M9.5.0/1
to:
SUMMER TOO =WETOWETDST,M3.5.0/1,MIO.5.0/1
In the "europe_middle:" section from:
SUMMER TOO =MET-IMETDST,M3.5.0/2,M9.5.0/2
to:
SUMMER TOO =MET-IMETDST,M3.5.0/1,MIO.5.0/1
Then, run the scoadmin System Time Manager, and select Change Timezone
from the Time menu. Select your correct timezone, click on OK and exit the
manager.
243
Specifying the locale
Clients
The following X clients have not been localized: fsinfo(X), rgb(X), startx(X),
xauth(X), xhost(X), xinit(X), xmodmap(X), xsconfig(X), xset(X), and xswkey(X).
Usage messages from clients have not been localized.
• No translated manual pages are shipped with this product, but translated
manual pages can be installed into /usr/lib/scohelp/lang/man/section. How-
ever, these manual pages will not be properly accessed by man. They will
be viewable from scohelp using Open Reference Page if an index is pro-
vided for them.
• There are some limitations with hyperlinks from French and German
homepages. When layered products that are not translated (such as Merge)
are installed, their links on the English library page are activated, but the
links to the French and German library pages are not activated. You can
only access this documentation using context sensitive help and internal
hyperlinks or the manual pages using the Open Reference Page command
of scohelp.
To enable Euro support, you must first set the 1508859-15 codeset (page 245)
and reboot your system. You can then display (page 246) and print (page 246)
the Euro currency symbol.
3. From the scroll lists on the International Settings Manager main window,
select a language and a keyboard.
4. From the Settings menu, select Codeset. ..lnternal, then select "1S08859-15".
Click on OK.
5. From the Settings menu, select Codeset. .. Console.
If your current console codeset starts with "1S08859", accept the default of
"1S08859-15". If you have a PS/2®-style keyboard (that is, your current
console codeset is "1BM850"), select "1BM858".
Click on OK.
6. Exit the International Settings Manager and reboot the machine. The
new system settings take effect after you reboot.
See also:
• "Selecting codesets" (page 227).
245
Specifying the locale
In the graphical environment, scoterm uses the Euro symbol fonts by default
when invoked from an 1508859-15 locale. Some X applications may require
additional arguments to get an 1508859-15 font. For example, to invoke xterm
using the 10x20 fixed-width 1508859-15 X font, enter the following:
xterm -fn lOx20-15
The default font "fixed" is unchanged from the default 1508859-1 fixed-width
font.
5ee also:
• locale(C) manual page.
5ee also:
• the Ip(C) manual page
• the text2post(ADM) manual page
• Chapter 4, "Managing printers and print jobs" in the System Administration Guide
247
Troubleshooting system-level problems
• Monitor system performance, error logs, and the system log book regularly.
This can enable you to correct problems before they cause a hard failure.
See "Checking system files with error histories" (page 260) for a list of use-
ful error log files.
• Install an uninterruptible power supply (UPS) on the system to protect the
system from damage during power surges and failures.
• Back up the system regularly. Consider running full system backups every
week or two. Because incremental backups are usually faster than full
backups, it is tempting to run full backups only rarely. However, if you
need to restore files, you may need to restore the most recent full backup
plus all incrementals run since then, which could be a long and tedious
process.
• Understand the purpose of the "override" terminal in dealing with the
security subsystem. The override terminal is used to correct errors that
prevent access to other terminals. By default, the console multiscreen
(fdev/ttyOl) is the override terminal. For more information, see Chapter 10,
"Starting and stopping the system" (page 169).
Record the divisions of your UNIX partition in your system log with
divvy(ADM), using this command:
divvy -P -N
The output will look like this:
0 0 14999 boot EAFS
1 15000 39574 swap NON FS
2 39575 346775 root HTFS
3 346776 1022965 u HTFS
6 1022966 1022975 recover NON FS
7 0 1023983 hdOa WHOLE DISK
If you have multiple partitions on the root disk, record them with
fdisk(ADM), including the start and end locations. Use this command:
fdisk -p
The output looks like this:
1 1 63999 UNIX Active
249
Troubleshooting system-level problems
NOTE The emergency boot floppy disk set must have a kernel with the
correct tape drivers installed. If you have changed the type of tape drive
since creating your emergency boot floppy disk set, you will need to config-
ure the tape drive at the Boot: prompt as described in "QIC-02 tape drive
bootstrings" (page 279) and "SCSI peripheral bootstrings" (page 280).
This runs all the programs necessary to initialize your disk as described in
"Installing a hard disk" (page 327), including:
• setting disk parameters with dkinit(ADM) if necessary; this is skipped
for SCSI disks
• partitioning the disk with fdisk(ADM). If you had multiple partitions,
you should use the information you recorded as described in "Record-
ing your root disk layout" (page 249). If only the root filesystem is cor-
rupted, it is not necessary to repartition the drive and you can simply
quit out of fdisk.
• mapping bad blocks or sectors with badtrk(ADM). You can choose
quick or thorough and destructive or non-destructive scans. If you des-
tructively scan the disk, you will overwrite the boot sectors of the drive
- see "System fails to boot or displays "NO OS" message" (page 188)
for more information.
• recreating the file systems and swap space with divvy(ADM). Use the
information you recorded in "Recording your root disk layout" (page
249). If you want to change the sizes, ensure they are at least as large as
before.
If the hard disk or file system information is still valid, you do not need to
recreate it. For example, if your hard disk still has a valid badtrk table,
you do not need to run a badtrk scan. Intact file systems will be preserved
if possible.
7. Soon after you see the Making filesystems message, the root prompt is
returned. Enter:
fsck /dev/hdOroot
This cleans the root file system on the hard drive.
8. Enter:
mount /dev/hdOroot /mnt
This mounts the root filesystem on the hard disk.
9. Insert the first volume of the root filesystem backup and restore the file-
system with the following commands:
cd/mnt
cpio -ivmkBud -I/dev/xxx
where xxx is either rctO (for a 1/ 4-inch cartridge tape) or rctmini (for a
mini-cartridge tape).
251
Troubleshooting system-level problems
NOTE If you see an error message like this when you attempt the
restore:
NOTICE: HTFS: No space on dev ram (31/7)
cpio: cannot write I_BACKUP_CONTENTS_: ...
•.. No Space left on device (error 28)
This means the files were written to the tape device using absolute
instead of relative pathnames. You are attempting to write to the root
filesystem loaded onto the ramdisk instead of the root file system on the
hard drive. You must add the -A option to the cpio command line:
cpio -ivmkBudA -I/dev/xxx
This suppresses absolute pathnames on the files passed to cpio.
10. After the restore is complete, make sure there is a stand directory at the top
of the root filesystem. If there is not, create it with the following com-
mand:
mkdir stand
I Server Release 5, you do not have a boot filesystem (lstand) and you
should not create it. You should also skip steps 12-14.
11. Unmount and clean the newly restored file system with the following
commands:
cd/
umount /dev/hdOroot
fsck /dev/hdOroot
You may see this message, which can be ignored:
umount: warning: Idevlfilesystetn was not in mount table
15. Restart your system from the root disk. Power-cycle the computer and
boot normally.
16. Restore any secondary file systems using the Backup Manager. When this
process is complete, your system should be returned to its original state.
System crashes
A flsystem crash" is the system going down without unmounting file systems
and doing other cleanup operations. This is also called an abnormal shut-
1/
When the system is shut down normally, the shutdown(ADM) program stops
all daemons, kills the active processes, unmounts any mounted file systems,
runs the sync(ADM) command, and tells init(M) to bring the system down to
the appropriate state (either single-user or flsafe to power off'), or to reboot.
If the system goes down before this shutdown procedure completes, file-
systems may be corrupted, resulting in lost data. Some data may be lost
because the buffer cache was not flushed to disk. The operating system
flushes the buffers to disk fairly regularly, so the amount of data lost due to an
abnormal system shutdown should be minimal. However, file system corrup-
tion is a common problem. If the root file system is corrupted, the system may
not function properly.
When the system crashes for any reason, record the relevant data in the sys-
tem log book and then reboot the system.
253
Troubleshooting system-level problems
NOTE We recommend that you save this dump to tape so you have a
record of the panic in case you need to compare it to the dump from
another PANIC that happens later, and so that you have the dump to
send to sca Support as discussed in "Additional help from sca Sup-
port" (page 264).
The following illustrates how to save the dump to tape. This example
uses /dev/rctO, but using /dev/rctmini works well if you have such a device
on your system.
There may be a system dump memory image in the swap device.
Do you want to save it? (yin) y
Wait.
dd if=/dev/swap of=/dev/rctO bs=120b count=751 skip=O
We strongly recommend that you use tapes rather than floppy disks to
save system dump images. The typical sea system has many megabytes
of memory, so it takes several floppy disks to save a single image. Prob-
lems can arise if you do not have enough floppy disks, or if you insert
them in the wrong order. You can run crash(ADM) on the dump from the
dumpdev device, or reboot the system and copy this data to disk for study.
See "Examining a memory dump with crash(ADM)" (page 262).
When it panics, the system writes the kernel image to the dumpdev device,
which is usually the same as the swap device. The data will be overwritten
as soon as any paging occurs on the system. See "Defining the default
dump device" in the System Administration Guide for more information.
4. If you want to study the dump image with the crash(ADM) command, use
the Idsysdump(ADM) command to copy the image to disk. In the sample
session that follows, 06May94 is the name of the file to which the dump
will be copied, but you can use any name that is meaningful:
# cd /tmp
# Idsysdump 06May94
Wait.
dd if=/dev/rctO bs=120b count=751
System dump copied into image. Use crash(ADM) to analyze the dump.
5. At the prompt to check the root filesystem, answer "y." This will check
and, in most cases, fix any corruption on the root file system. In rare cases,
the operating system becomes corrupted and must be restored or rein-
stalled. See "Cleaning file systems" (page 171) for more information.
255
Troubleshooting system-level problems
6. Run fsck(ADM) on those filesystems that were mounted when the system
panicked. This happens automatically for all file systems that are marked
dirty when the system is brought up to multiuser state, but by running
fsck manually, you can control the response to problems that are found.
See the fsck(ADM) manual page for more information.
7. Verify the integrity of the security system. See "System file integrity
checking: integrity(ADM)" in the System Administration Guide.
Automatic reboot
sea OpenServer systems can be configured to reboot automatically after a
panic or power outage as described in "Changing the system restart options"
(page 182).
NOTE If you set the system to automatically reboot after a panic, you will
lose the memory dump that enables you to analyze the cause of the prob-
lem.
If the trap happens in user mode (in other words, if the trap is caused by a
user process), the kernel usually sends a signal to the process. For example, if
a process executes an instruction that causes a divide-by-zero error, the CPU
raises a divide-by-zero exception, and the trap handler ultimately sends a
SIGFPE (floating point error) signal to the process. (See the signal(S) manual
page for a complete list of supported signals.) Some user exceptions are legal
and do not cause a signal. For example, a process may de-reference a valid
pointer that identifies a piece of data in the process's data segment that is
currently paged out of main memory. The CPU raises a page fault, and the
trap handler then loads the page of data from the swap area into memory and
restarts the instruction that caused the fault. In this case, the trap handler
does not send a signal to the process.
Except for a few special circumstances, the kernel is not allowed to cause
traps, faults, and exceptions "by itself," (in other words, when it is executing
system calls, system processes, and interrupt routines). If the kernel does
cause a fault, the situation is considered to be so serious that the system can-
not continue to run. The trap handler calls a special panic( ) routine inside the
kernel, which stops the system.
When the system panics because of an addressing violation, the current con-
tents of the CPU registers are displayed on the console, the contents of the ma-
chine memory is written to dumpdev (usually the swap device) and the system
makes an internal call to the kernel haltsys( ) function.
The console display when the system panics looks something like the follow-
ing. The line numbers are included for reference only; they do not appear on
the actual display.
257
Troubleshooting system-level problems
PANIC:
2 erO OxFFFFFFEB er2 OxOOFFFFFF er3 OxOOO02000 tlb OxOO500E80
3 ss OxOOOOO038 uesp OxD0119554 efl OxOOOl0282 ipl OxOOOOOOOO
4 cs OxOOOOO158 eip OxDOO70488 err OxOOOOOOOO trap OxOOOOOOOE
5 eax OxOOFFFFFF eex OxOOOOOOOO edx OxOOOO0305 ebx OxDOOCD780
6 esp OxEOOOOD40 ebp OxEOOOOD64 esi OxD0119554 edi OxOOOOO038
7 ds OxOOOOO160 es OxOOOOO160 fs OxOOOOOOOO gs OxOOOOOOOO
To calculate the EIP value, join the register values for the Code Segment (cs
register) and the Instruction Pointer (eip register) as a pair of numbers,
separated by a colon, and without the leading zeros. In the sample above,
these two values are at the beginning of line 4. The value of cs is OxOOOOOl58
and the value of eip is OxD007488. Therefore, the EIP value is 158: D0070488.
The EIP values of several panics can be compared to indicate whether the pan-
ics are being caused by a software or hardware condition. Three or more
identical EIP values usually indicate a software problem; successive panics
with different EIP values indicate a hardware problem such as a bad memory
board. This is not a hard and fast rule; defective RAM can cause multiple pan-
ics with the same EIP value, for example.
Kernel error messages report driver errors and errors in other parts of the ker-
nel such as the process scheduling subsystem and the file subsystem. Moni-
toring these message regularly is an important step in preventing serious sys-
tem problems; studying these messages after a system problem develops is an
important part of troubleshooting the system. Reading the PANIC error mes-
sage can give valuable information about the cause of the system failure.
Messages that have INIT for class are generated by the init(M) process and
are documented on the init(M) manual page. These messages usually occur
during system initialization. A few of the init messages indicate error condi-
tions, but many more are just informational messages.
ddname names the driver or subsystem having problems. The actual peri-
pheral is usually identified by a pair of numbers of the form major/minor.
This identifies the device number of the peripheral where the error occurred.
The routine element indicates the subsystem that detected the condition; these
portions of the error message are included mostly to help support staff in
tracking difficult system problems.
PANIC messages are not usually logged in the /usr/adm/messages file, but other
messages that occurred before the panic are usually logged and can provide
valuable information about the cause of the panic. The PANIC message is
usually displayed on the system console or can be viewed with the panic
function of the crash(ADM) command.
In the example console dump on "Console panic information" (page 257), the
PANIC message does not follow the standard format. This usually means that
the error is from the main kernel code and not a driver. In this case, the mes-
sage includes a definition of the type of trap that caused the panic. The mean-
ing of these trap numbers is defined in the /usr/include/sys/trap.h file and docu-
mented on the messages(M) manual page. In this case, it is a paging viola-
tion, which usually occurs when an errant pointer is dereferenced in a driver
or other kernel code.
259
Troubleshooting system-level problems
261
Troubleshooting system-level problems
WARNING The argument to the -n option must be the name of the execut-
I able kernel file on which the system was last booted. If the -n option is not
specified, crash assumes the /unix file. .
Studying a panic
The following list outlines the process for determining which kernel com-
ponent caused a system panic. For detailed information about interpreting
crash(ADM) output, see Appendix D, "Using the crash(ADM) diagnostic tool"
in the System Administration Guide.
1. PANICBOOT=NO must be set in the fete/default/boot file for this to work.
2. When the system panics, write down the type of panic (see the trap(M)
manual page), the EIP number, and the size of the dump in pages from the
console display.
3. When the machine reboots, save the kernel dump that is on the dump de-
vice as shown in "Recovering from a system panic" (page 254).
4. Put the machine in single-user mode.
5. Run crash(ADM) on the image.
6. Use the panic command in crash to find the routine in which the panic
happened. Be sure to verify that the trap type and EIP match those copied
from the console screen after the panic.
7. Note the name (symbol name) of the routine that was executing when the
system panicked. This is the function listed first under the Kernel Stack
before Trap line.
8. Quit the crash command.
9. Use strings(C) or nm(CP) to determine the driver in which that routine is
located. You can run a script such as the following, which uses strings.
If this script were installed as findpanic, you would run it with one argu-
ment that gives the name of the kernel routine:
findpanic symbol_name
This script will output something like:
routine name
/etc/conf/pack.d/foo/Driver.o
This indicates that the foo driver may have been responsible for the sys-
tem panic.
263
Troubleshooting system-level problems
265
Troubleshooting system-level problems
Another indicator that cron is not running is if previously scheduled jobs are
not being executed. Use the following command to see if the cron daemon is
running:
ps -ef I grep cron
If there is no cron process, then the daemon is not running. To start cron, log
in as root and enter the following command:
sd cron
If this does not start the cron process, simply reboot the system. During
startup, the system displays a message like the following:
! *** cron started *** pid = 140 Wed Aug 31 14:02:47 PDT 1994
The jobs scheduled with at, batch, and crontab should now execute properly.
If at and batch continue to report error messages, refer to at command fails:
1/
NOTE If this is a persistent problem, you can start cron logging by entering
CRONLOG=YES in the /ete/default/cron file. After cron is started, the
/usr/spool/cron/log file will hold a record of all cron transactions. This infor-
mation may help you determine why cron is halting.
tration Guide.
To allow the changes to take effect, the user must log out and then log in
again.
This is different from the situation in which the user is not authorized to use at.
If a user who is not authorized tries to use at, the system displays:
at: you are not authorized to use at. Sorry.
To allow a user to use at, see "Changing the job scheduling permissions for a
user" in the System Administration Guide for more information.
Runaway processes
A "runaway process" is a process that enters an infinite loop and spawns new
processes. This can cause an overflow in the proc table that causes other pro-
cesses to fail with the No more processes: error message.
A runaway process can cause an error that locks up the keyboard, preventing
anything that the user types from reaching the system. Because of this, a
runaway process cannot be stopped from the invoking terminal.
The last command may leave temporary files that are usually removed when
a program terminates normally, or a non-echoing terminal. Refer to Restor-If
ing non-echoing terminals" (page 448) to restore the terminal to normal opera-
tion.
If the runaway process does not stop when you enter kill with the -9 option,
the process is considered "unkillable". If the unkillable process is a user's
shell, you must stop the process before that user can continue working. To
stop an unkillable process, you must reboot the system. Use the following
procedure:
1. Log in as root and send a message using wall(ADM) to the other system
users notifying them of the impending shutdown.
2. When all the users have logged out, shut down the system by entering
init 6. The root prompt (#) is returned, but the shutdown process begins
soon afterward.
3. Reboot the system by pressing (Enter) at the Boot: prompt.
267
Troubleshooting system-level problems
271
Basic hardware con figuration
screen
~ouse
I
Ab%$%$b~keyboard I
CD-ROM drive
tape drive
parallel 1/0
serial 1/0
math coprocessor
CPU
memory
New and updated drivers for current and previous sca OpenServer releases
can be downloaded from the sea Software Library:
ftp://ftp.sco.com/pub/drivers/
273
Basic hardware con figuration
Supported architecture
Except where otherwise noted, the hardware information in this book applies
to the PC bus architectures supported by sca: Industry Standard Architecture
(ISA), Extended Industry Standard Architecture (EISA), Micro Channel Archi-
tecture (MeA), and Peripheral Component Interconnect (pcl). sca Open-
Server systems support a limited number of Personal Computer Memory
Card Interface Association (PCMCIA) cards but do not currently support the
complete PCMCIA subsystem.
In addition to the specific devices mentioned here, there are many others
which require additional vendor supplied software. These are available from,
and supported by, independent hardware vendors. Call your reseller or sales
representative and ask for the latest sea Hardware Compatibility Handbook or
the sea Directory. These are also available online from the sca World Wide
Web homepage and can be accessed with a suitable browser. The URL (Uni-
form Resource Locator) is:
http://www.sco.com/chwp
NOTE Supported machines are not always supplied with video adapters
from the same manufacturer. Check the video adapter for compatibility.
The hardware described in this book has been tested with sea OpenServer
systems. However, because the manufacturers of compatible machines or
add-on peripherals may change configuration, functionality, or firmware at
any time, no guarantee is implied.
Some computers arrive with the hard disk only partially formatted. If you
have such a machine, use the correct low-level or hard format procedure as
described in the manual for your hard disk controller before installing an seQ
OpenServer system. This does not apply to most SCSI or IDE hard disk drives.
We recommended that you install the operating system without any addi-
tional or unnecessary hardware installed on the system and with any switch
settings at their factory defaults. Hardware configuration conflicts can make
installation of an seQ OpenServer system difficult or impossible.
If you have added any boards, make sure that all switches or software-
controlled settings are set as recommended in the manufacturer's hardware
manual for that board. Some computers require specific switches or soft-
ware-controlled settings to run seQ OpenServer systems. If your computer
does not run the seQ OpenServer system with the settings as shipped, contact
your computer hardware representative for the proper settings.
275
Basic hardware con figuration
Using bootstrings
A bootstring is a special command or text string that is entered at the Boot:
prompt displayed at system startup. Normally this process is transparent to
the operator because when you press (Enter) at the Boot: prompt, the system
uses a pre-defined bootstring such as hd(40)unix specified by DEFBOOTSTR
in Jetc!default/boot. .
There are special bootstrings that permit you to define device configurations
that override system defaults (without relinking the kernel). For example, you
might be using a tape drive at a non-standard address or the system might not
be recognizing your host adapter correctly. In a similar way, new device
drivers that are not supplied with seQ OpenServer systems can be installed
from a floppy disk using the link bootstring.
For additional information on the boot process and bootstrings, see the
boot(HWt boot(Ft bootstring(HWt link(HWt and mem(HW) manual pages.
277
Basic hardware con figuration
apm.check=yes
Check for APM support (default).
apm.exists=disable
Try to disable any BIOS-APM found. The APM is not used again.
apm.exists=ignore
Do not get power status. The BIOS-APM will not be used again.
apm.exists=status
Try to get power status (default). The various internal parameters that
store the status of the batteries and mains power can be tested using the
apm.warn and apm.boot bootstrings. These allow booting to be aborted
and a warning issued if there is insufficient power available.
A status error does not stop APM being used; in that case, the
apm.warn= and apm.boot= conditions are not tested.
apm.exists=verbose
Print messages on failure; otherwise, apm.exists=status is silent on
errors.
apm. warn=test
Issue a warning if the test is true. The syntax of the boolean test is
defined on the hasapm(ADM) manual page.
To try to overcome this problem, the apm. warn test could be changed to:
!ac.online & !battery.unknown & (charge.critical I % <= 25)
However, this may not work on all such machines.
The kernel can only use APM if it supports a 32-bit Protected Mode interface.
If such an interface is available, one of the following bootstrings can be used:
apm.conned=disable
Try to disable BIOS-APM interface. Proceed with boot.
apm.conned=must
Try to connect, and stop booting if this fails.
apm.conned=no
Do not use the BIOS-APM interface. Proceed with boot.
apm.conned=yes
Try to use the BIOS-APM interface, and continue to boot even if this fails
(default).
279
Basic hardware con figuration
NOTE The ct bootstring only applies to QIC-02 cartridge tape drives; it does
not work for SCSI, QIC-40, or Irwin drives. SCSI bootstrings are described in
"SCSI peripheral bootstrings" (page 280).
SCSI device bootstrings allow you to install the SCO OpenServer system from
a device connected to the system at a SCSI address other than the default. For
example, you should use the Sip bootstring during installation if your tape
drive is configured at a SCSI ID that is not currently allowed as a boot device
by the installation kernel.
Valid host adapter driver prefixes are defined in the file letc!defaultlscsihas.
For example, to define a SCSI tape device connected to the first Future Domain
adapter at id 4, lun 0, use the following bootstring:
Stp=fdha(O,4,O)
I NOTE Many EISA, MCA and PCI drivers get configuration data exclusively
from CMOS RAM, ignoring bootstrings.
281
Basic hardware con figuration
To boot from a Compaq IDA drive, you would use the bootstring hd=idaO.
You should add this bootstring to the definition of DEFBOOTSTR in the file
fete/default/boot so that the system uses the correct root disk configuration
when it boots.
If you are having trouble installing sca OpenServer due to errors with specif-
ic drivers, you can disable these drivers with the disable bootstring. Provided
that these drivers are not required to install the system, use the following:
The srom bootstring allows you to specify the location of a CD-ROM on the
EDIE (IDE) bus:
srom=wd«IDE Controller>, <Master/Slave>, <LUN>, <BUS»
The valid options for any of the above arguments are "1" or "0". For example,
to specify a CD-ROM that is on the secondary IDE controller that is set to mas-
ter, type:
srom=wd(1,O,O,O)
If the CD-ROM is the only device on the IDE interface, it must be set to master.
NOTE Please note that you cannot specify IDE hard drives in the same
manner. If IDE hard drives are present, the installation uses the
Primary / Master IDE hard drive as the root drive.
Memory bootstrings
The mem bootstring enables you to discover how much memory boot thinks
your system has, and to reconfigure this if necessary. To find out how much
memory boot thinks your system has, enter mem=/p.
NOTE boot ignores memory definitions below 1MB. The operating system
Icannot address high memory from 640KB to 1MB, and its upper address limit
is 4GB.
Memory above 16MB is not addressable by DMA for those peripheral control-
lers that only support 24-bit addressing. To mark memory above 16MB on a
24MB machine as non-DMAable, enter mem=1m-16m,16m+8m/n.
For more information about the mem bootstring, see the mem(HW) manual
page.
cache bootstring
Both 486 and Pentium processors have an internal on-chip cache and an
optional external cache. boot can control the cache behaviour with the cache
bootstring. The following options are available:
283
Basic hardware con figuration
Id Disable flushing the cache. Booting will take less time if flushing is dis-
abled. However, this may cause some machines to incorrectly size mem-
ory or fail to boot.
Ie Enable flushing the cache (default).
In Switch off the cache before loading the kernel. This may be necessary for
some machines which have problems with cache coherence (this occurs
when DMA does not notify the internal cache that memory has been
written to directly).
Iy Switch on the cache after the kernel is loaded (default). Machine perfor-
mance is enhanced if caching is enabled.
See the bootstring(HW) manual page for further details. You can also set
these bootstrings as arguments to a defined bootstring in letcldefault/boot such
as DEFBOOTSTR (see the boot(F) manual page.)
Invoke link by typing link at the Boot: prompt and pressing <Enter), or by
using the link= bootstring argument.
If you invoke link directly, it prompts for the names of the packages to load:
What packages do you need linked into the system,
or q to quit?: pkgl pkg2
The link command ignores any link= bootstring arguments.
Alternatively, you can use a link= bootstring argument which has the syntax:
link="pkgl pkg2 ..."
where pkgl, pkg2 and so on are the names of BTLD packages to be linked into
the loaded system kernel.
If the package names do not include the name of the device from which to
read the BTLDs, you can define the device using the bltd (or btlddev) boot-
string. The default device is usually the same as the one from which the boot
program was loaded.
After the kernel loads but before it runs, link prompts you to insert the
appropriate floppy disk for each BTLD package you specified.
You may now be prompted to enter any tuneable parameters and hardware-
dependent parameters such as the interrupt vector (IRQ), DMA channel, and
base I/O address. If any conflicts occur (for example, if the interrupt vector
that the boot-loaded driver wants to use is already occupied by another
driver), boot explains the problem, lists the possible resolutions, and prompts
you to choose.
If any errors occur while the BTLDs are being extracted, you must reboot the
system. Insert the NOO (installation boot) floppy, and enter restart at the Boot:
prompt to restart the installation or upgrade from the beginning.
INOTE Retain the BTLD disk(s) for use later in the installation. You will need
them to configure the drivers into the Link Kit.
285
Basic hardware con figuration
Once you configure the driver, click on the Relink Kernel button; click on
Relink to confirm. See "Relinking the kernel" (page 290) for more information.
To activate the new kernel once it is relinked, reboot your system using the
System Shutdown Manager or the shutdown(ADM) command.
You can also use the Hardware/Kernel Manager to tune the kernel parame-
ters. To do this, click on the Tune Parameters button. See "Configuration
tools" in the Performance Guide.
See also:
• "The Hardware/Kernel Manager interface" (this page)
• "The UNIX system kernel" in the Operating System User's Guide
• mkdev(ADM) manual page for command-line interface
287
Basic hardware con figuration
289
Basic hardware con figuration
Tape drive
"Installing a tape drive" (page 344)
XENIX Filesystem
" Adding support for different file system types" in the System Administra-
tion Guide
See also:
• "Configuring drivers with the Hardware/Kernel Manager" (page 286)
• mkdev{ADM) manual page for command-line interface
• Chapter 20, "Configuring video adapters" {page 355)
• Chapter 29, "Configuring network connections" (page 481)
It is also possible to relink the kernel by hand. You might do this when, for
example when you have added several different drivers to the system and
chosen not to relink as part of the mkdev process, or you have installed BTLDs
using installpkg(ADM). In order to relink the kernel you must be logged in as
root, and the Link Kit must be installed on your system.
The system now backs up the old kernel by moving the current /unix file to
/unix.old, then asks whether you also want the kernel environment rebuilt.
This will make any necessary changes to the /etc/inittab and device node
files. Enter "y" to rebuild the kernel environment.
The system will respond with a message that the kernel has been success-
fully linked and installed and that you must now reboot the system for
any changes to take effect.
2. Use the shutdown command to shut the system down then reboot it.
NOTE APM is not configured in the kernel by default. You must run the
mkdev pm command or use the Hardware/Kernel Manager to install the
APM driver and support utilities.
If your system has the required APM hardware, and this was recognized and
enabled by boot(HW) at boot time, see" Advanced Power Management boot-
strings" (page 277). The Power Management daemon, pwrd(ADM), runs to
handle system events notified by the BIOS-APM firmware, such as low power.
Possible events are defined in the file /etc/pwr/sys/events, the format is defined
on the pwrevents(F) manual page. An action is defined for each event that
allows the system to respond appropriately. Possible actions are defined in
the file /etc/pwr/sys/actions, the format for which is defined on the pwraction(F)
manual page. You can find the scripts invoked by the action file in the direc-
tory /etc/pwr/lib. An example is battery which shuts the system down if the
power is low. Edit the actions file and scripts to tailor the response of your
system to the various power events. However, events are pre-defined in the
BIOS; you cannot configure the thresholds at which they occur yourself.
291
Basic hardware con figuration
pwrsh can read commands from the command line (using the -c option) from
a specified file, from the standard input, or interactively. If you run pwrsh
interactively, use the? or help command for information about other com-
mands. Enter quit or (Ctrl)D to leave pwrsh. You can use the status command
to obtain the boot-time, previous, or current power status of the machine's AC
supply and batteries:
/etc/pwr/bin/pwrsh -c "status -b -AB # print boot-time power status"
/etc/pwr/bin/pwrsh -c "status -n -AB # print previous power status"
/etc/pwr/bin/pwrsh -c "status -AB # print current power status"
You can also specify a power test condition to the status command in the style
of hasapm(ADM) - see also the description for the apm.boot and apm.warn
in Advanced Power Management bootstrings" (page 277). pwrsh exits with
H
a value determined by the last command executed. When a test is used with
the status command, this is the result of the test:
[ /etc/pwr/bin/pwrsh -c "status -s \
!ac.online & Ocharge.low I !charge. critical I \
(!charge.unknown& % <= 25»"] \
&& echo "No AC power and battery charge is low!"
You can use the state command to turn the system or peripheral devices on
(Ready) or Off, make them Idle but automatically ready for use, or Freeze
them to conserve data.
I NOTE Some BIOS-A PM firmware can only Freeze the entire system or turn
Off individual peripherals.
For example, the following command idles the entire system if battery power
is low and the AC supply is not being used:
[ /etc/pwr/bin/pwrsh -c "status -s \
!ac.online & (charge.low I charge. critical )" ] \
&& /etc/pwr/bin/pwrsh -c "state -i all"
The following command freezes the video screen and keyboard and idles the
hard and floppy disks:
/etc/pwr/bin/pwrsh -c "state -f display \
state -i storage"
WARNING If you turn off the power to the entire system or to the hard
Idisk(s), you risk losing valuable data and damaging the integrity of file-
systems.
293
Basic hardware con figuration
Serial and parallel adapters are discussed in Chapter 21, "Adding serial and
parallel ports" (page 367). Installation of other types of devices with bus cards
is explained in detail in other chapters of this book.
WARNING Make sure the computer is unplugged from the power supply or
you could injure yourself.
295
Adding memory and bus cards
Before you plug your card into the bus, reset any switches or jumper settings
that must be changed. The documentation that comes with it should list the
default settings and how to change them.
NOTE sca OpenServer systems are designed to work with most hardware
I using default settings. You will rarely have to change the settings on a card.
When you have finished inserting cards, replace the computer's case, turn the
power on and boot the operating system.
You may need to use the manufacturer's setup program to change the
system's configuration before you can use the new hardware. The eisa(ADM)
utility can be used to list cards currently installed on an EISA bus system. The
slot( C) utility does the same thing for MCA machines.
3. Boot the operating system. The boot screen details how the additional
memory has affected your system.
297
Adding memory and bus cards
32-bit memory
It is strongly recommended that you use 32-bit memory approved by your ma-
chine manufacturer. Using 16-bit memory instead will degrade overall
machine performance.
NOTE Certain manufacturers reserve the upper 384KB of the first megabyte
for DOS. On some machines, this" shadow" RAM cannot be accessed by SCo
OpenServer systems. You may need to install additional memory to run SCO
OpenServer systems. If possible, "BIOS shadowing" and "video shadowing"
should be disabled.
At boot time, the SCo OpenServer system announces the presence of a math
coprocessor with the message:
%£pu - 13 - TYPE=80387
299
Adding memory and bus cards
Note that switches on the main system board must be set properly to enable
80387 interrupts, and/or your system must be reconfigured with the manu-
facturer's setup disk. Ensure that the system diagnostics recognize the copro-
cessor's presence, and check your hardware manual for the proper switch
settings.
Some 80387 exceptions are masked. Refer to the fp(HW) manual page for
more details.
You can replace the 386 chip with a newer release of the 386 chip (a D-step
part), or bypass the 387 chip by adding the ignorefpu keyword to the boot
command:
Boot :
unix ignore£pu
This means that the operating system will not use the 387 chip, but you need
not remove it physically; the coprocessor can still be used by other operating
systems. To bypass the 387 chip automatically every time you boot your sys-
tem, add the ignorefpu keyword to the defbootstr option in the
/etc!default/boot file. See the boot(HW) manual page for more information.
Weitek coprocessors
Weitek numeric coprocessors are also supported. This support extends only to
runtime; there is no current development support for creating binaries that
take advantage of numeric coprocessors.
In order for the Weitek chip to be recognized by the system, one file needs to
be edited in the following way:
1. In the file /etc/conf/sdevice.d/weitek, there should be a line similar to the fol-
lowing:
weitek N 1 0 0 '"
Change the liN" (for no) to a "Y" (for yes).
2. Relink the kernel, then reboot the machine. The Weitek chip will now be
recognized.
301
Adding memory and bus cards
A host adapter is configured into the system when you first install one of the
peripheral devices connected to the SCSI bus that it controls. See "Adding a
SCSI peripheral device" (page 305).
The number of different SCSI host adapters that can be configured for use with
your system should be specified in the hardware documentation. See sea
Open Server Features and Limitations for information about supported mass
storage drivers.
303
Adding SCSI host adapters and peripherals
SCSI addresses
Each controller on the SCSI bus (including the host adapter) has an address
referred to as its "controller" ID or "target" ID. Up to eight controllers may be
present on a SCSI 1 bus with IDs from 0 to 7; up to 16 controllers may be
present on a 16-bit-wide SCSI 2 bus with IDs from 0 to 15. The host adapter
itself is usually assigned ID 7.
Controllers may be placed in any order on the bus, but they must have a
unique controller ID. The controller ID is usually set on the SCSI peripheral de-
vice using jumpers, DIP switch, or thumb-wheel. Refer to the adapter docu-
mentation for specific instructions.
SCSI host
embedded bridge
adapter
controller controller
107
CPU
SCSI bus
system bus
SCSI host adapter drivers are configured into the kernel when you configure
the first SCSI peripheral connected to a adapter. See" Adding a SCSI peripheral
device" (page 305). Host adapters of the same type as one already installed
use the same driver; their only requirement is memory space for configuration
information that is internal to the driver. If you wish to use the ability of cer-
tain host adapters to emulate other adapters, you must specify the correct de-
vice driver for the host adapter being emulated when configuring peripherals.
The sca modular SCSI interface provides a generic set of SCSI peripheral
drivers that may be used with any of the supported hosts' adapter drivers.
Each different type of host adapter that is installed requires its own driver to
be configured into the kernel.
Supply the following information about the device to update the mscsi file:
• Host adapter type (the internal name of the device driver for the host
adapter). Supported types are listed in /etc!default/scsihas. For example, eiad
is the driver for the Adaptec AHA-174x. If you have installed a host adapter
driver using a BTLD, the host adapter type is the same as the name of the
driver that you linked into the kernel.
• Host adapter number. Use 0 for the first adapter of a given type, 1 for the
second, and so on.
• Peripheral'S SCSI bus number. Use 0 for the primary bus, 1 for the second-
ary bus. This information is required for host adapters that control more
than one SCSI bus, such as those that use the Adaptec 7770 chipset. The
bus number for host adapters with only a single bus is O.
• Target ID of the device's controller. ID 7 is usually reserved for the host
adapter.
• Logical unit number (LUN). Set this to 0 for devices with embedded con-
trollers.
305
Adding SCSI host adapters and peripherals
If the disk is the first peripheral device that you are adding to the SCSI bus,
you must also supply some of the following information about the hardware
configuration of the host adapter (this information is used to update the file
letc!conf/sdevice.dlxnamex ):
• Interrupt vector (IRQ) (needed for ISA bus machines only).
• Start I/O hexadecimal address (needed for ISA and some MCA bus ma-
chines).
• End I/O hexadecimal address (needed for ISA and some MCA bus
machines).
You are presented with the default values for the first host adapter of this type
or the values for the previous host adapter of this type that was configured on
the system. If you have changed the values physically set on the host adapter,
you must enter these instead of the displayed values.
You are not prompted for configuration values for most EISA and PCI bus host
adapters. These are assigned by the EISA or PCI configuration utility into
CMOS RAM and read by the device driver at boot time.
See also:
• /I Adding SCSI / EIDE CD-ROM drives" (page 307)
• /I Adding floptical drives" (page 309)
• /I Adding secondary hard disks" (page 324)
• "Installing a tape drive" (page 344)
When the host adapter drivers register the host adapters that they find at boot
time, they print a line with the following format for each adapter found:
%adapter start-end IRQ DMA type=ha ha=number id=ID [ [fts=] string]
where:
start is the start I/O address in hexadecimal
end is the end I/O address in hexadecimal
IRQ is the interrupt vector; this appears as if the host adapter is
II - "
polled
DMA is the DMA channel; this appears as if Bus Master DMA is used.
II - "
You can mount an ISO 9660, High Sierra, or Rock Ridge format CD-ROM as a
read-only filesystem. This allows access to files which are described by the
primary volume descriptor on the CD-ROM. Access to files described by sec-
ondary volume descriptors is not supported.
A maximum of 255 SCSI CD-ROM drives per system are supported; seven per
SCSI 1 bus, or fifteen on a 16-bit-wide SCSI 2 bus. The device files used for
access to the CD-ROM drive are documented on the cdrom(HW) manual page.
CD-ROM file systems containing extended attribute records are supported. You
can access record format information and the file access permissions in an
extended attribute record using options to mount(ADM).
307
Adding SCSI host adapters and peripherals
For EIDE I ATAPI drives, you will need to specify whether it is attached to a
primary or secondary controller and whether it is configured as master or
slave.
For SCSI drives, you will need to specify the SCSI host adapter type, the host
adapter number, target ID, and logical unit number (LUN) as described in
"SCSI addresses" (page 304). If this is the first SCSI peripheral that you are
adding to the SCSI bus controlled by a host adapter, you may need to supply
additional hardware information about the adapter as described in "Adding a
SCSI peripheral device" (page 305).
NOTE To bring the CD-ROM drive online, you must insert a disk. If you
I attempt to bring up the drive without inserting a disk, the message cannot
open is displayed.
309
Adding SCSI host adapters and peripherals
The likely causes for a SCSI peripheral not being recognized are:
• The SCSI bus is terminated at some point between the host adapter and the
controller for the peripheral that is apparently missing. The bus must be
correctly terminated at both ends only; no terminating resistors must be
present at any other place on the bus. Controllers usually use plug-in ter-
minating resistors or DIP switch settings to allow termination. Check the
intermediate controllers on the bus for premature termination. Incorrect
termination can also lead to data corruption.
• The target ID set on the controller board is the same as that of another con-
troller on the same bus.
• The target ID set on the controller board differs from that defined in the file
/etc!conf/cfd/mscsi.
When you configure a card with the ISA PnP Configuration Manager, you set
the card's resources to match values compatible with existing UNIX® ISA
drivers.
You can also use the ISA PnP Configuration Manager to disable a device on a
specified card (page 316).
See "Terminology and concepts" (page 319) for a glossary of terms and infor-
mation on which files the manager uses and updates.
311
Installing Plug and Play devices
When you start the ISA PnP Configuration Manager, this window displays
the cards currently detected on your system:
Devices available for use with that card are shown in the bottom point-and-
pick list.
The names of these cards and devices are generated from the cards them-
selves.
NOTE If you attempt to start the ISA PnP Configuration Manager and no
cards are found on your system, an error message appears. See No ISA PnP
cards detected (page 318) for more information.
The card should be enabled for Plug and Play mode. Check the card's docu-
mentation to determine whether or not you need to set jumpers on the card to
enable this capability.
If you installed the card before you installed the system, start the ISA PnP
Configuration Manager and skip to "Selecting a card and device to configure"
(page 314).
313
Installing Plug and Play devices
Each time you highlight a different card, the list of devices below changes to
contain the devices associated with the selected card. For example, a sound
card might support audio, an IDE CD-ROM, and a joystick.
When you click on Edit, a list of resource descriptions and resource settings
appear for the selected device.
The list you see might contain other choices defined by the manufacturer, and
there can be multiple versions of each type.
315
Installing Plug and Play devices
NOTE Not all system BlOSs are Plug and Play aware. If yours is not, you
will need to manually configure the device using the Edit button (page 314).
If the BIOS is Plug and Play aware, it allocates resources to Plug and Play de-
vices each time the system boots. When you enter the ISA PnP Configura-
tion Manager after the system reboots, the device might or might not
appear to be configured. This is because the seo OpenServer PnP driver is
not managing the device directly; instead, the system BIOS handles all con-
figuration. What the BIOS reports to the manager is BIOS-dependent.
If you want to permanently assign resources to your Plug and Play device,
you must specifically set them using the Edit button (page 314).
Disabling a device
After you return to the main window, apply any changes and relink the kernel
(this page).
I NOTE The changes you made will not be in effect until you relink the
kernel and reboot the system.
3. To halt the system, use the System Shutdown Manager (page 178) or the
shutdown(ADM) command.
4. Boot the system into multiuser mode.
317
Installing Plug and Play devices
Card A physical card, also called an adapter, board, or node, that controls
one or more Plug and Play" devices".
Device A functional hardware subset resident on a Plug and Play card. Mul-
tiple devices, such as CD-ROM and joystick controllers, may reside
on a single card.
Resources
One of the following hardware parameters that can or must be set
for each configured device:
DMA
direct memory access channel
IRQ interrupt vector
I/O address
input/output address through which this device communicates
319
Installing Plug and Play devices
Mem address
memory address for this device
Each resource can be set to either a value, to NONE (meaning that no
value is required), or to OFF (meaning that the device is currently
disabled).
For detailed descriptions of these parameters, see Appendix A,
"Configuration parameters" (page 503).
Resource configuration names
A set of resource values which the card manufacturer has defined.
Each set of values is defined as one of the following:
Current
existing device configuration
Good
preferred configuration (highest priority)
Acceptable
lower priority configuration that is still valid
Sub-optimal
configuration that will function but should only be used if other
good or acceptable configurations are not available or cause
conflicts
A given device can have multiple instances of Good, Acceptable, and
Sub-optimal settings.
/dev/Pnp Kernel device driver used to recognize and query ISA Plug and Play
hardware, and to allocate resources to that hardware. Any settings
specified in /etc/conj/pack.d/PnP/space.c are used as directives.
/etc/isapnpslot
Utility which uses /dev/PnP to extract current and possible resource
information. When new resources are specified by the ISA PnP Con-
figuration Manager, isapnpslot verifies that the resource allocation
is valid.
/etc/pnp The ISA PnP Configuration Manager. This utility uses information
provided by isapnpslot to display card and device resource selec-
tions. When the user sets resources, disables devices, or otherwise
modifies the Plug and Play hardware, /etc/pnp rewrites
/etc/conf/pack.d/PnP/space.c to reflect the changes.
/dev/string/cfg
A special file (not directly viewable) that contains existing driver set-
tings. The data contained in this file is normally displayed during
system boot or by using the hwconfig( c) command.
/etc/hw A utility used by isapnpslot to obtain system hardware information
about EISA, ISA, MCA and PCI buses.
/usr/lib/hw
A database used by isapnpslot to obtain system hardware informa-
tion about EISA, ISA, MCA and PCI buses.
321
Installing Plug and Play devices
If you have multiple hard disks in your system, you can manage your data
storage more effectively by configuring them as virtual disks. See" About vir-
tual disks" in the System Administration Guide for details.
NOTE The SCO OpenServer system supports large (more than 528MB) EIDE
disks that use logical block addressing (LBA) but it does not support the full
EIDE command set.
On ISA, EISA, MCA, and PCI bus machines, the wd device driver is used with
disks which present a WDIOlO or ST506 interface. This includes IDE and EIDE
drives. The Sdsk device driver is used with all SCSI disks.
323
Adding hard disks
On MCA bus machines, the esdi device driver is used with ESDI disks. The
st506 device driver is used with ESDI disks which are configured to present an
ST506 interface.
Refer to the seQ Hardware Compatibility Handbook for a list of supported disk
drives.
To install an IDE, EIDE, ESDI, or IDA disk, follow the procedure in "Installing a
hard disk" (page 327). For SCSI disks, first set up the SCSI configuration files
and link the correct device drivers into the kernel using the Hardware/Kernel
Manager or mkdev hd as described in "Configuring a SCSI hard disk" (page
325). Then proceed to "Installing a hard disk" (page 327), where you invoke
the same command a second time to partition the disk and make the file-
systems.
LUN 0 LUN 0
disk 0 disk 1
SCSI host
embedded embedded
adapter
controller controller
ID7
SCSI bus
system bus
Figure 18-1 Example of a mixed ST50S-interface disk controller and SCSI configuration
Ensure that the additional drive is formatted and passes the manufacturer's
diagnostic tests before installing the system. If it does not pass the diagnostic
tests, you should not use it with your system.
(page 305) for an explanation of what this information means and how to
obtain it.
325
Adding hard disks
If the disk is the first peripheral device that you are adding to the SCSI bus,
you must also supply the following hardware configuration information
about the host adapter:
• interrupt vector
• start I/O hexadecimal address
• end I/O hexadecimal address
2. Log in as root and put the system into maintenance mode.
3. Select Hard Disk from the devices listed by the Hardware/Kernel Manager,
or enter the command mkdev hd. (Enter mkdev hd -u or mkdev hd -h if
you require detailed usage and help information for mkdev.)
4. If your root disk is attached to an ST506-interface controller (IDE, EIDE, or
some ESDI configured to use this interface) or an ESDI controller, specify
that you want to add a hard disk to the SCSI bus.
If your root disk is attached to a SCSI controller, specify that you want to
add another SCSI disk.
5. Enter the SCSI host adapter type, and the number of the host adapter.
6. If you are adding the first device to a host adapter, confirm that you wish
to change its setup parameters, enter the hardware details about the host
adapter card and confirm that you want to save these values.
You can exit at this point if you have entered the wrong details.
7. To install a controller on a host adapter that controls two SCSI buses,
specify to which bus (0 or 1) the controller is connected.
8. Enter the SCSI bus number, target ID of the controller and the LUN of the
disk on the controller.
The information you have supplied is displayed:
Host
Adapter Adapter
Type Device Number ID LUN Bus
ad Sdsk o o
This example shows a SCSI hard disk with controller ID 1 being added to
the first Adaptec AHA-154x host adapter on a system. The bus number is
shown as 0 as this is a single bus host adapter.
If the information is correct, confirm that it should be used to update the
SCSI configuration. Otherwise, start the configuration again, or exit.
9. You are given the option of relinking the kernel. If you have more devices
to add, you can defer doing this until later.
10. When you have relinked the kernel, use the System Shutdown Manager
or the shutdown command to shut down the system, then reboot.
After rebooting the system, you must run mkdev hd or the Hardware/Kernel
Manager a second time to partition the disk as described in "Installing a hard
disk" (this page).
This section describes how to install an additional IDE, EIDE, ESDI, IDA, or
SCSI hard disk. If the disk is SCSI, you must already have updated the system
configuration files as described in "Configuring a SCSI hard disk" (page 325).
For all disk controller types, it is assumed that you have already physically
installed the hard disk and booted the system.
NOTE If you are installing a disk that already contains filesystems, you can
retain the data they contain by preserving the disk's existing partition and
division information. However, as a precaution, you should back up the
data before removing the disk from the old system.
327
Adding hard disks
dkinit is not run for SCSI disks. If you move a SCSI disk between ma-
chines or change the host adapter, you may need to run dparam(ADM)
on the disk to change the geometry defined in the masterboot block.
See "Writing a new masterboot block" (page 337) for more information.
• If your disk has an IDE, EIDE, or ESDI controller, mkdev hd runs
fdisk(ADM) to allow you to create disk partitions. See "Partitioning a
hard disk using fdisk" (page 330) for more information.
• If your disk has an IDE, EIDE, or ESDI controller, mkdev hd runs
badtrk(ADM) to allow you to scan the disk and map bad tracks to the
bad track table reserved within a UNIX system partition. For SCSI disks,
mkdev hd uses badtrk to reserve a table for bad SCSI logical blocks but
it does not allow you to scan the disk. See "Scanning a disk for defects
using badtrk" (page 331) for more information.
If the virtual disk driver is linked into the kernel, and you want to con-
figure your multiple hard disks as virtual disks, choose to exit at this
point and run the Virtual Disk Manager. See Chapter 8," Administer-
ing virtual disks" in the System Administration Guide for details.
• The mkdev hd script runs divvy(ADM) to allow you to divide a UNIX
system partition into separate file systems and swap areas. See "Divid-
ing a disk partition into divisions using divvy" (page 333) for more in-
formation.
The installation and configuration of your hard disk is now complete. You can
return the system to multiuser mode. See Chapter 2, "Administering filesys-
tems" in the System Administration Guide for details of how to mount the new
filesystems for use.
If you have a standard hard disk (one that is supported by your computer
hardware or special motherboard ROM), select the default disk configuration
and quit. The installation continues by running fdisk(ADM) to allow you to
partition the disk. See "Partitioning a hard disk using fdisk" (page 330).
NOTE If you are not sure whether your disk is nonstandard, check the
default parameters using the dkinit display option. Calculate the size of
your disk in bytes using the formula:
size = cylinders x heads x sectors per track x 512
Some drives are sold by formatted size, others by unformatted size. The for-
matted size of a drive is approximately 85% of its unformatted size. The
parameters displayed by dkinit may not match the drive manufacturer's
documentation. Some controllers have optional translation, mapping, or 63-
sector modes. If one of these modes was chosen during low-level formatting,
your sea OpenServer system must be initialized with the translated parame-
ters and not those of the physical drive. In all cases, the known size of the
drive should approximately match the size calculated above from the disk
parameters.
If your disk is nonstandard, you must enter information to replace the disk
configuration information in ROM. If you are unsure of what parameters to
enter for your nonstandard disk, contact your disk manufacturer for this in-
formation.
NOTE Most modern IDE and EIDE disk drives have integrated disk control-
329
Adding hard disks
Figure 18-2 shows the internal architecture of a hard disk and its associated
terminology.
----:---cw--- Cylinder
If you want to create just a single UNIX system partition on the entire disk,
select that option, check it using the display option, then quit.
I NOTE Do not run badtrk on IDA disks. IDA controllers handle bad tracks
automatically.
When you first install a SCSI disk, badtrk creates a table of bad blocks in the
partition but it does not scan the disk. To scan a SCSI disk for bad SCSI logical
blocks, you must run badtrk on it after you have installed the disk. On SCSI
disks, badtrk tries to use spare disk blocks that are maintained by the disk
controller as replacements for bad blocks. If bad blocks cannot be mapped out
in this way, the disk driver maps out bad blocks using the spare blocks and
the bad block table in the disk partition. You can force it to use this table by
331
Adding hard disks
badtrkcan:
• display the current bad track/block table. This is an example of a bad track
table with a single entry:
Defective Tracks
+-----------------------------------------------+
Cylinder Head Sector Number(s)
+-----------------------------------------------+
11. 190 3 12971-12987
+-----------------------------------------------+
• scan the disk for flaws. The scan can be "quick" or "thorough", destructive
or non-destructive. Typical scan rates are 18MB per minute for quick, and
6MB per minute for thorough. Do not choose a destructive scan if you want
to preserve existing data on the disk.
Whenever badtrk finds a defective track, it displays its location on the disk,
for example:
WARNING: wd: on fixed disk ctlr=O dev=0/47 block=3l434 cmd=00000020
status=00005180, sector = 62899, cylinder/head = 483/4
You can interrupt the scan at any time and return to the main badtrk menu.
• add entries to the current bad track/block table.
On some IDE and EIDE drives which remap the disk geometry, the cylinder,
head, sector reported for a bad sector or block may not correspond to the
actual physical values of these quantities. In such a case, you should deter-
mine an absolute block address for the sector(s) or block(s) to be remapped
using the formula:
logical address = «cylinder+ 1) x (head+ 1) x (sectors per track» + sector
Note that this assumes that the first cylinder, head, and sector are all num-
bered from o.
• delete individual entries from the current bad track/block table.
• delete all entries from the bad track/block table.
• enable Automatic Read / Write Remapping on SCSI disks that support this
feature. Any bad blocks that develop on the disk will be reallocated auto-
matically to the defect list managed by the disk controller.
When installing a new disk, you should perform a thorough destructive scan
on the complete UNIX system partition. It may take several hours to scan a
1GB disk.
WARNING If you run badtrk(ADM) yourself, take care not to run a destruc-
tive scan on the wrong disk by mistake. For example, to specify the first par-
tition of the third hard disk, you would enter:
/etc/badtrk -f /dev/rhd21 -s td
See hd(HW) for a description of hard disk naming conventions.
When using mkdev hd to install a hard disk, if badtrk finds a flaw in the first
few tracks of the UNIX system partition, it returns you to fdisk (page 330).
You can then repartition the disk to exclude the defective tracks from any par-
tition. When you leave fdisk, badtrk runs again to allow you to scan the disk
for further flaws. This process continues until badtrk finds no flaws in the first
few tracks. You may have to experiment to determine how many tracks to
exclude.
When you quit badtrk while first installing a disk, it prompts you for the
number of tracks to reserve as replacements for flawed ones. Allocate at least
as many tracks as badtrk recommends. This number is based on the current
number of bad tracks plus an allowance for tracks that may go bad. If you
ever exceed the number of allocated bad tracks, you must reinstall the hard
disk.
WARNING If you run badtrk on a disk which already contains file systems,
the data in these will be lost if you change the size of the bad block table. In
such a case, remake the file systems and restore the data from a backup
archive.
333
Adding hard disks
Changes are not final until you quit divvy and select install (i) from the clos-
ing menu. To leave divvy without saving your changes, select exit (e) from
the closing menu.
Creating and resizing divisions
If you are partitioning your primary hard disk at install time, you can reallo-
cate the space used by the default root division to create multiple filesystems.
Do not change the other divisions (including swap, recover, and boot) unless
you are an experienced administrator. For the primary hard disk, you would
first shrink the root division using the e command to define the new ending
block. You can then create and name a new division that starts after the end-
ing block of the resized root division and ends at the old ending block for the
root division.
I NOTE The maximum filesystem size that you can create using divvy is 1
terabyte for DTFS and HTFS, and 2GB for other filesystems.
A limitation of the system BIOS is that it will not boot an operating system
that lies on or past the 1024th cylinder on the root hard disk. See "BIOS sup-
port for disks larger than 1024 cylinders" (page 337) for more details.
The disk device drivers of some operating systems (but not the SCO Open-
Server system) use the BIOS to access the hard disk in regular use. This means
that they cannot access disk blocks that lie past the 1024th cylinder. Disk con-
trollers which support logical block addressing or LBA (IDE drives with more
than 1024 cylinders, most EIDE drives, and all SCSI drives) can remap or
translate the geometry of the disk so that it appears to the system to have less
than 1024 cylinders.
On some machines, the disk geometry is stored in CMOS RAM (parameter
RAM) on the motherboard. See "Defining IDE and ESDI disk geometry in the
BIOS" (page 336) for information on what you should do if the disk geometry
information becomes lost from CMOS RAM. If a BIOS extension is used, the
disk geometry may be stored on the disk controller or SCSI host adapter.
When booting from the hard disk, the BIOS reads the masterboot block to find
out which active partition it should boot the system from. If the partition con-
tains the SCO OpenServer system, the hdbootO, hdbootl, and boot bootstrap
programs execute in sequence. If necessary, these programs can translate
between different geometries defined for the root disk in the BIOS and the
masterboot block. The boot program also passes on the geometry information
obtained from the BIOS for use by disk device drivers.
335
Adding hard disks
If you move a root disk between machines or change its host adapter (if SCSI),
the geometry defined in the BIOS may no longer match the geometry that the
operating system previously used to access the disk. This may happen if you
move a SCSI disk to a new host adapter that assumes a different disk
geometry, or if you move an IDE drive to a different computer. In such cases,
you may be able to boot the machine but be subsequently unable to use the
disk because the information about the disk geometry stored in the master-
boot block does not match that defined in the BIOS. You can write the BIOS
disk geometry information to the masterboot block on the root hard disk as
described in "Writing a new masterboot block" (page 337).
If you do not want to change the geometry information stored in the master-
boot block because you need to define the disk as having less than 1024
cylinders, you can override the root disk geometry information stored in the
BIOS when you boot the system as described in "Overriding the root disk
geometry stored in the BIOS" (this page).
You may need to use the biosgeom bootstring to override the geometry
defined for large SCSI disks when used with host adapters which assume a
standard disk geometry. If you do not redefine the geometry passed to the
device driver, the values defined for the number of heads and sectors in the
BIOS of the host adapter may imply that the disk has more than 1024
cylinders. See "BIOS support for disks larger than 1024 cylinders" (page 337)
for more information.
To find out the current numbers defined for the disk's cylinders, heads, and
sectors, enter the biosgeom command at the boot prompt.
Once the disk geometry has been redefined in this way, you can boot the sea
OpenServer system or any other operating system on the root disk using the
bootos(HW) command from the boot prompt.
To add this geometry definition to the default bootstring, edit the definition of
DEFBOOTSTR in fete/default/boot. For example:
DEFBOOTSTR=hd(40)biosgeom unix=(255,255,63)
Alternatively, if the BIOS defines the disk as having less than 1024 cylinders,
or the boot filesystem and all other operating system partitions lie within the
first 1024 cylinders, you can redefine the disk geometry stored in the master-
boot block on the disk as described in "Writing a new masterboot block" (this
page).
Writing a new masterboot block
To change the disk geometry defined on the masterboot block of the root disk:
1. Put the system in single-user maintenance mode.
2. Enter the following command to write a new masterboot block to the root
disk:
/bin/dparam -w /dev/rhdOO
337
Adding hard disks
You can use the rest of the disk for swap space, the root file system and addi-
tional filesystems.
The BIOS on some IDE, most EIDE, and all SCSI disk controllers allows remap-
ping or translation of large disks so that they appear to have less than 1024
cylinders. For example, the extended BIOS for the Adaptec 1542, 1742, and
274x controllers allows 2GB SCSI disks to be mapped as 255 heads, 63 sectors
and 255 cylinders.
If you are upgrading your system rather than performing a new installation,
the roof filesystem must fit within 1024 cylinders because there is no separate
boot filesystem in this case.
The drives are connected to the adapter by a single 40-conductor cable that
carries both control and data information.
You must set the jumpers on the drives according to the number of drives
installed. If two or more drives are connected, one must be jumpered for mas-
ter mode, the others for slave mode. A single drive connected to an IDE
adapter must be jumpered for single drive mode.
You must also select the ST506 interface on the drive if this can be set using
jumpers. Refer to your drive documentation for details.
The embedded controller on most IDE drives can perform automatic sector
translation. This allows the drives to be configured with several different
head/cylinder /sectors per track settings. You may want to use some settings
other than the factory defaults if your drive has more than 1024 cylinders or if
the new settings more closely match some drive type in the BIOS. This is an
important issue if you are also installing another operating system such as
DOS. See "BIOS support for disks larger than 1024 cylinders" (page 337) for
more information.
WARNING Automatic sector translation means that many IDE hard drives
should not be low-level formatted. A formatting utility will not understand
the underlying hardware of the drive and may render it useless. Check with
the manufacturer of a IDE hard drive before attempting to reformat it.
WARNING You should perform regular full and incremental system backups
of the filesystems on the root disk to be able to restore these in case of a root
disk crash.
1. Install the new disk. If the drive is not a SCSI drive and is not identical to
the original, be sure you change the BIOS settings with the setup program
provided with your computer hardware to record the new disk parame-
ters. See the documentation provided with your system hardware.
2. Start a fresh installation. From the Preparing your disk and choosing soft-
ware screen, select Hard Disk Setup. From the Disk 0 Partitions and file-
systems screen, select Customize. Recreate each of your old filesystems.
Make the sizes of your file systems at least as large as the originals, other-
wise your backups will not fit when you restore them.
3. When you are returned to the Preparing ... screen, select Optional soft-
ware. You can omit installation of all optional software by typing n for
Operating system services, Graphical environment, and so on.
4. When installation is complete, put the system into single-user mode and
restore your root file system backup. For example, to restore a epio( C)
backup, enter:
epio -imuevdB -I/dev/rdO
If your tape drive is not yet configured, run mkdev tape to reconfigure
your tape drive so that you can restore your backups. As an alternative,
you can reboot and specify the appropriate bootstring for the tape device.
For example, to configure a Wangtek drive:
Boot
: bd(40)unix ct=wangtek(Ox338,5,1)
5. If you have a SCSI system and you changed the host adapter in addition to
changing the root disk, follow these additional steps:
a. Remove your old host adapter driver from your kernel configuration
by editing the file:
/ete/eonf/sdevice.d/adapter
where adapter is the name of the SCSI driver for your old host adapter
(see /etc!default/scsihas for a list of host adapter drivers).
339
Adding hard disks
c. In the same directory, edit the file that corresponds to your new host
adapter. Change N to Yin the second column.
d. Edit the file /etc!conf/cfd/mscsi, replacing each instance of the old host
adapter driver name (first column) with the new name, as in this exam-
ple that uses the Adaptec driver, ad:
*ha attach number IO lun bus
*
ad Stp o 2 o o
ad Sdsk o o o o
6. Relink your kernel to restore your system configuration using the follow-
ing commands:
cd /etc/conf/cf.d
./link_unix
8. After rebooting your system, restore the backups for your other file-
systems on the root disk (if any). Any non-root disks should be accessible
after the restore of the root filesystem.
If your hard disk develops a bad track after the system is installed and run-
ning, an error message like the following is displayed on the console:
wd: ERROR on fixed disk ctlr=O dev=O/47 block=31434 cmd=00000020
status=00005180, sector = 62899, cylinder/head = 483/4
For a SCSI disk, the message is like this:
NOTICE: Sdsk: Unrecoverable error reading SCSI disk 2 dev 1/64
(ha=O id=l lun=O) block=219102
Medium error: Unrecovered read error
If such an error occurs, use badtrk(ADM) to create a new bad track table so
that the system can avoid the new bad track(s). The badtrk utility is a menu-
driven utility for viewing, adding, or deleting entries in the bad track table.
badtrk automatically enters any flaws it detects in the table, provided there is
room. SCSI disks have a similar mechanism that maps bad SCSI logical blocks
instead of bad tracks. By default, badtrk will try to add bad blocks to the
drive's own internal defect list (G-list) if the drive supports this. You can use
the -0 option to badtrk to force badtrk to add the bad block to the table
managed by the operating system. If your SCSI disk controller supports
Automatic Read/Write Remapping (ARR/ AWR), you can use badtrk to enable
this feature. This allows recoverable errors to be automatically remapped
whenever they occur.
To use badtrk, reboot the system and enter single-user mode. (Do not use
shutdown su to do this.) Run badtrk, scan the disk, and the entire UNIX sys-
tem partition. Choose either a quick or thorough scan; a thorough scan is
recommended if new bad tracks have appeared. Select nondestructive mode
to preserve the data on your hard disk. When the scan completes, quit, and
return the system to multiuser mode.
341
Adding hard disks
Note that some SCSI and IDE disk controllers have their own
cylinder /head/sector translation logic, and will probably ignore any reformat
command sent to them.
I disks. Consult the disk controller documentation first if you intend to refor-
mat your disk.
WARNING Automatic sector translation means that many IDE hard drives
should not be low-level formatted. A formatting utility will not understand
the underlying hardware of the drive and may render it useless. Check with
the manufacturer of a IDE hard drive before attempting to reformat it.
Some SCSI host adapter controllers (for example, the Adaptec AHA-154x) have
a set of BIOS routines that allows you to format or redefine the geometry of a
SCSI hard disk. Refer to your hardware documentation for more information.
When installing a SCSI tape drive, you must use a SCSI host adapter that is
supported by sca. Refer to the sea Hardware Compatibility Handbook for a list
of supported host adapters and drives. You should also verify with your
hardware supplier that the drive will work with the host adapter. See sea
Open Server Features and Limitations for information about supported mass
storage drivers.
You can also use tape compression, partitioning, and variable block size with
SCSI tape drives that support these features.
343
Adding tape drives
more instructions.
To install a non-SCSI tape drive, see one of these sections:
• Installing a QIC-02 cartridge tape drive" (page 345)
If
If you need to change any parameters, change them one at a time from the
modification menu.
Table 19·1 Default and suggested alternate settings for ISA and EISA controllers
Type Manufacturer DMA Interrupt Base liD
channel vector (IRQ) address
1 Archive 3 3 Ox220
1 4 Ox200
1 3 Ox200
3 Wangtek 1 5 Ox338
1 5 Ox300
4 Emerald 3 9 Ox300
5 Mountain 1 3 Ox28C
6 Tecmar 1 5 Ox330
7 Everex or Tandberg 1 5 Ox2CO
Enter 0 (zero) values to accept the default hardware settings for the tape con-
troller card.
The following notes apply to ISA and EISA tape controller cards:
• Typically, DACK and DRQ are set to the same channel value.
• Set the interrupt vector (IRQ) to a value between 2 and 7 that is not in use
by another card. You can use vectorsinuse{ADM) to find a suitable value.
See Table 14-1, HTypical device interrupts" (page 275) for details of typical
interrupts use by the system. The most commonly available interrupt is 5,
as most systems do not have a second parallel port.
• Set the base I/O address to a value that is not in use by any other card.
Most common tape controller 1/ a addresses are not used by other devices.
345
Adding tape drives
For MC tape controller cards, the controller type, manufacturer, and default
hardware settings are shown in the following table:
The installation script prompts you to change the default bootstring if you
want to alter the configuration settings used for the tape device at boot time.
See the boot(HW) manual page for more details.
You can now relink the kernel and reboot to use the tape drive. You may
defer relinking if you have other devices to configure.
Irwin drives differ significantly from standard QIC tape drives in that they are
not configurable and do not require you to enter any hardware parameters
while installing them.
1. Specify that you want the drive to be unit 1. The appropriate device files
are now created.
2. The installation script prompts you to change the default bootstring if you
want to alter the configuration settings used for the tape device at boot
time. See the boot(HW) manual page.
3. You can now relink the kernel and reboot to use the tape drive. You can
defer relinking if you have other devices to configure.
4. You must create the Irwin configuration file letc!defaultlmcconfig if you
want to specify debugging, hardware-specific options, and other features.
See the mcconfig(P) manual page.
These units are specialized mini-cartridge units that follow the QIC-40 / 80
specification. They do not use the same format as Irwin mini-cartridge drives.
Refer to your tape drive documentation for instructions on how to specify the
drive by resetting jumpers.
1. Specify whether you are installing a QIC-40 or QIC-80 drive, and whether
you wish to enable extended tape length mode. Do not enable extended
length mode if your drive does not support it. See the floppytape(HW)
manual page for information on extended length mode.
2. Enter the hardware configuration option for your drive. Archive and
Mountain drives can use Soft Select mode. Wangtek drives may be config-
ured to use Phantom select mode. Refer to your tape drive's documenta-
tion for the necessary jumper settings to use these modes. Quit from the
configuration menu to create the device files.
3. The installation program prompts you to change the default bootstring if
you want to alter the configuration settings used for the tape device at
boot time. See the boot(HW) manual page for details.
4. You can now relink the kernel and reboot to use the tape drive. You may
defer relinking if you have other devices to configure.
SCSI tape drives are added to the system as SCSI devices. You must specify the
SCSI host adapter type, the host adapter number,target ID, logical unit num-
ber (LUN), and bus number as described in "SCSI addresses" (page 304).
If this is the first SCSI peripheral that you are adding to the SCSI bus controlled
by a host adapter, you may need to supply additional hardware information
about the adapter as described in "Adding a SCSI peripheral device" (page
305).
1. Select SCSI tape device installation. If the SCSI tape driver is not already
configured into the kernet the installation does this automatically.
2. Enter the type and number of the host adapter. If the host adapter driver is
not already configured into the kernel, enter the requested hardware con-
figuration information. Confirm the values displayed to update the Link
Kit.
3. Enter the details of the SCSI address of the drive and confirm the informa-
tion.
347
Adding tape drives
4. Specify the following information to configure the tape drive optimally for
the system. To select a generic SCSI configuration, press (Enter) when
asked for these values:
vendor-specific ID string
The string returned by the SCSI device INQUIRY command.
SCSI version
Enter 1 for SCSI 1, or 2 for SCSI 2.
response data format
Enter 0 for SCSI 1, 1 for the common command set (CCS) REQUEST
SENSE command, or 2 for SCSI 2.
Obtain this information from the documentation that was supplied with
the tape drive or by contacting the manufacturer.
5. Choose one of the following entries that describes the type of tape drive
you are installing:
• Generic SCSI 1 I SCSI 2 (including 9-track)
• Exabyte 8mm (8200 or 8500)
• IBM rebadged Exabyte 8mm (8200)
• DAT (compressing and non-compressing)
• QIC cartridge
This will enable the SCSI tape device driver to make best use of the drive's
capabilities. If you are unsure, choose the default generic SCSI IISCSI 2
option.
6. The installation prompts you to change the default bootstring if you want
to alter the configuration settings used for the tape device at boot time. See
the boot(HW) manual page for details.
7. You can now relink the kernel and reboot to use the tape drive. You may
defer relinking if you have other devices to configure.
3. The installation script prompts you to change the default bootstring if you
want to alter the configuration settings used for the tape device at boot
time. See the boot(HW) manual page for details.
4. You can now relink the kernel and reboot to use the tape drive. You can
defer relinking if you have other devices to configure.
Note that these problems generally occur immediately after installing your
tape drive.
349
Adding tape drives
351
Adding tape drives
3. Make sure that the proper device for the tape drive is located in the /dev
directory. Enter:
l/dev/rctO
The output should look like this:
crw-rw-rw 1 root root 10, 0 Feb 14 12:00 rctO
(The major device number (10) may differ.) If the listing of /dev does not
contain a line similar to this, run mkdev tape again to create the device.
4. Verify that all cables are connected correctly.
5. If the tar command still does not work, the tape may be broken. See your
hardware documentation.
2. Verify that the ID number for the controller of the device is correct and
does not clash with the ID of any other device on the SCSI bus. The ID
number is determined by the jumper settings on the controller. The valid
range is 0-7 for SCSI 1 and 0-15 for a 16-bit-wide SCSI 2 bus. SCSI tape
drives are often configured for ID 2.
3. Make sure that the host adapter number is correct. The first SCSI host
adapter of a given type is 0; the second is l.
4. Check that the LUN (Logical Unit Number) is correct. In most cases, the
controller is embedded in the same physical unit as the device and sup-
ports one device with LUN O. If the controller is not embedded, it supports
up to eight devices. If this is the case, the LUN is determined by the
jumper settings on each device. The valid range is 0-7.
5. Verify that the host adapter itself is recognized at boot time.
6. Verify that the tape drive is supported. Refer to the sca list of compatible
hardware for a list of supported tape drives.
353
Adding tape drives
If it cannot find the tape drive, the system displays a message such as:
ir: ERROR: Tape controller (type=irwin) not found
Verify that the settings you supplied when you installed the drive match the
actual jumper settings on the back of the floppy tape drive. Refer to the hard-
ware documentation.
1. If you see a cannot allocate buffer or not enough space error message
while using the tape drive, you have run out of memory.
2. If you are using an Irwin mini-cartridge tape drive, reboot your system
into maintenance (single-user) mode, run /etc/mcdaemon, and restart the
backup. The Irwin drive requires mcdaemon to be run before the drive
may be used.
If you are using a QIC-40 or QIC-80 drive, see the floppytape(HW) manual
page for information on ft.alloc.switch, ft.minbufs, and ft.maxbufs.
These values give an indication of how to allocate more memory at system
initialization time for QIC-40 and QIC-80 tape drivers.
New and modified video adapter drivers are made available periodically; see
"Accessing the sea Compatible Hardware Web Pages" (page 273). For the
new graphics features and drivers included with this sea OpenServer release,
see sea Open Server Features and Limitations.
This chapter describes how to use the Video Configuration Manager to con-
figure video adapters and monitors. It includes:
• "The Video Configuration Manager interface" (page 356)
• "Understanding video configuration" (page 357)
• "Adding a new video adapter" (page 361)
• "Modifying monitors, resolutions, and function keys" (page 362)
• "Removing a video configuration" (page 365)
• "Configuring unsupported adapters" (page 366)
355
Configuring video adapters
The Video Configuration Manager reads the function key (or devices) files at
system startup to associate ttys with function keys (page 365). These text files
are located in the lusrlliblvidconf/devices directory and contain the device driver
names for all the programmed function keys on the console «Fl) through
(F12», as well as the device driver name for the console. The console driver is
used when the system is running in single-user mode.
See also:
• "Understanding resolutions" (page 358)
• "Generic driver configuration" (page 358)
• "Understanding multi-monitor configuration" (page 359)
357
Configuring video adapters
Understanding resolutions
Some resolutions only work if you have enough video adapter memory.
Make sure you have at least the minimum DRAM or VRAM to support the
desired number of colors at the specified resolution:
NOTE Some drivers may require memory above these minimum levels for
off-screen memory.
The mw driver is used by the VESA graphics driver to support VESA VBE ver-
sion 1.2 adapters:
• at 256 colors at resolutions of 640x480 to 1024x768
• using a windowed frame buffer to display graphics
Because of its generic nature, the VESA driver works on virtually any modern
graphics adapter. No chipset-specific accelerations are provided; using high
resolutions or 64K colors may cause a degradation in performance depending
on machine and graphics adapter speeds. If a specific driver is provided for
your adapter, you should use it to take advantage of accelerated features.
During initial system installation (ISL), the default graphics configuration is
set to VESA at the mode 800x600 with 256 colors. If a specific driver is pro-
vided for your adapter, run the Video Configuration Manager (scoadmin
video) to reconfigure it. Using an accelerated driver will provide increased
graphics performance.
The actual resolutions and number of colors available using the VESA driver
depends on the video adapter. The recommended mode is 1024x768 with 256
colors. Make sure your monitor supports this resolution prior to configuring
it.
The refresh rate is not set by the VESA driver but is instead set by the adapter
itself.
Understanding mUlti-monitor configuration
sea systems provide limited support for "multi-monitor" configuration, also
known as "multi-headed" configuration. Multi-monitor support means you
can display one graphical environment on two (or more) monitors, thus
increasing your graphical work space.
To determine if your adapter will support multi-monitor configuration:
• Ensure that your graphics adapters support multi-monitor configuration
and have no hardware conflicts. They must not use the same 1/ a ports
(page 505) or base addresses (page 509). Your graphics adapter documen-
tation may indicate if your adapter supports multi-monitor (or "multi-
headed") configuration. Install each adapter individually to verify that the
graphical environment functions properly.
• Consult your adapter documentation to ensure that VGA can be disabled.
359
Configuring video adapters
See also:
• "Understanding video configuration" (page 357)
• "Function keys and video configuration" (page 365)
• mwm(Xe) manual page
• "Setting sea Panner resources" in Using sea Panner
• Appendix A, "aSF /Motif window manager resources" in the Graphical Environment
Guide
• Chapter 5, "Understanding resources" in the Graphical Environment Guide
WARNING Ensure that the resolution you select is appropriate for your
monitor; see "Understanding resolutions" (page 358) for more informa-
tion.
361
Configuring video adapters
See also:
• "Configuring unsupported adapters" (page 366)
• "Understanding video configuration" (page 357)
See also:
• "Understanding video configuration" (page 357)
• "Function keys and video configuration" (page 365)
• "Understanding resolutions" (page 358)
• "Understanding multi-monitor configuration" (page 359)
INOTE If you do not find your monitor in the list, choose the "Other ..."
selection that most closely resembles your own.
WARNING Ensure that the resolution you select is appropriate for your
monitor; see "Understanding resolutions" (page 358) for more informa-
tion.
Adding a resolution
To add a new resolution:
1. Select a resolution, then click on Modify in the main Video Configuration
Manager (page 356) window.
2. Click on Add Resolution.
3. Specify the new resolution in the Resolution Selection window, then click
on OK.
363
Configuring video adapters
WARNING Ensure that the resolution you select is appropriate for your
monitor; see "Understanding resolutions" (page 358) for more informa-
tion.
See also:
• "Understanding multi-monitor configuration" (page 359)
• "Understanding video configuration" (page 357)
• "Running programs simultaneously with multi screen displays" (page 141)
If you are unsure about the current adapter and resolution, look in the
"Current selection" field at the top of the window.
See also:
• "Function keys and video configuration" (page 365)
See also:
• " Assigning function keys" (page 364)
• "Configuring unsupported adapters" (page 366)
CAUTION Unless you have more than one configured resolution, removing
the associated monitor or the only configured resolution removes the entire
selected graphics configuration.
365
Configuring video adapters
NOTE You may also be able to adjust an existing grafinfo file to fit your
graphics adapter. However, if you copy a compatible grafinfo file and try to
adapt it, you may have to supply details about your adapter not commonly
found in adapter user documentation (for example, the coordinates of off-
screen memory). Further information about developing graphics drivers and
grafinfo files can be found in Developing NFB graphics adapter drivers, which
is included with the Hardware Development Kit (HDK).
See also:
• "Understanding video configuration" (page 357)
• "Adding a new video adapter" (page 361)
supported serial cards" (page 368) and" Adding and configuring parallel
ports" (page 376).
In the standard IBM interrupt scheme, serial ports on COMl use IRQ 4, and
serial ports on COM2 use IRQ 3. Serial ports on COM3 can share IRQ 4 with
COMl, and serial ports on COM4 can share IRQ 3 with COM2. Alternatively,
serial ports on COM3 and COM4 can use polling.
The serial driver in SCO OpenServer allows serial ports on COMl to use IRQ 4,
and serial ports on COM2 to use IRQ 3. It does not allow serial ports on COM3
or COM4 to share interrupt vectors with COMl or COM2, and it does not sup-
port polling.
For ISA and EISA bus machines, the serial driver in seo OpenServer supports
several serial cards on COM3 and COM4 that can use IRQs other than 4 and 3.
You may be able to adjust jumpers on the serial card to change the IRQ and
base I/O address. See the documentation provided with the card for more in-
formation. For MCA machines, the serial driver only supports cards on ports
COMl and COM2. For PCI machines, the serial driver supports cards on ports
COMl through COM4 and assigns configuration values automatically. See
"Serial cards on ISA and EISA machines" (page 373) and "Serial cards on Micro
Channel Architecture machines" (page 375) for details.
The ways in which you can combine dumb single port and multipart serial
cards is limited by the minor numbering scheme of the devices. See "Combin-
ing single port and multipart serial cards" (page 372) for details.
367
Adding serial and parallel ports
If your system does does not report the configuration of a serial card correctly
at system startup, the card may not be configured correctly. Check the card's
hardware documentation for the proper settings.
The Serial Manager allows you to configure Sea-supported serial cards (this
page) and individual serial ports (page 370). You can start the Serial Manager
in any of these ways:
• Enter mkdev serial or scoadmin serial manager on the command line.
• Double-click on the System Administration icon on the Desktop, then on
Hardware/Kernel Manager, and select Serial Port from the devices listed.
• Start the SeOadmin launcher by entering scoadmin on the command line,
then select Hardware/Kernel Manager, and select Serial Port from the de-
vices listed.
• Select Configure from the Ports menu in the Modem Manager (page 408).
• the dumb serial cards that are currently configured for each serial controller
• the ports that are controlled by the card that is currently highlighted
369
Adding serial and parallel ports
NOTE Serial boards can only be configured on COM ports that map to
supported unit numbers (page 369). Depending on the capabilities of
the boards installed on your system, you might need to disable a board
on an existing controller or add a new one. For example, if the board
you wish to add is listed as supporting only unit 0 or 1 and there are
already boards configured on those units (that is, on COMl and COM2),
you must disable the board on unit 1 before configuring a new one.
However, if the new board supports unit 2, you can configure that board
atCOM3.
If you select a PCI board, IRQ and base I/O values are dimmed (cannot
be selected) because they are assigned automatically.
To modify the configuration of a serial card, select the card from those
listed, and click on Modify. Change the configuration of the board, and
click on OK when you have finished.
To delete a configured serial card, select the card from those listed, and
click on Delete.
2. If you want to change the speed or interrupt trigger level, or to enable or
disable a login for any of the ports on a serial card, follow the instructions
in "Configuring a serial port" (this page).
3. Click on Close.
NOTE If the Serial Manager relinks the kernel because you changed the
configuration of the serial ports, you must shut down and reboot the
system for the changes to take effect.
I NOTE You cannot select a serial port which has a mouse or other point-
ing device attached.
2. You can change the information for any of the following fields:
Speed (bps)
Select the default speed for the serial port. The selected speed should
not be greater than the capabilities of the UART (universal asynchro-
nous receiver/transmitter) chip that controls the port. Table 21-1
shows how the maximum speed is limited by the capabilities of the
UART hardware.
Table 21-1 Serial port speeds, line-mode labels, and UART limitations
The table shows the highest speeds that can be used with ports con-
trolled by 8250, 16450, and 16550 UARTs on normally loaded systems.
The 16450 and later chips in the series can achieve higher speeds than
the 8250 chips. The specification for the 16450 chip allows it to run at
speeds of up to 115,200bps when used with terminals and printers. It
is unreliable at speeds over 19,200bps when used with high-speed
modems because it does not have a receive buffer. The 16550 has a 16-
byte receive buffer which allows it to be used with modems at speeds
up to 115,200bps.
NOTE The speed limitations shown may be too high for heavily
loaded systems which cannot react quickly enough to move data
from the UART's receive buffer.
To determine the type of UARTs your computer uses, use the Microsoft
MSD program (available under DOS) to discover this.
Line-mode label
Click on Change to change the line mode for the serial port. Select a
line-mode label from the list displayed and click on OK to confirm.
INOTE You cannot change the line mode if it is the only one that is
defined for the currently selected line speed.
The "line mode" determines the default characteristics of the serial port
such as parity, and number of bits per character. Each line-mode label
corresponds to a separate entry in letc/gettydefs. Table 21-1 shows com-
monly used line-mode labels for each speed. See "Installing serial ter-
minals" (page 432) and the gettydefs(P) manual page for more informa-
. tion.
371
Adding serial and parallel ports
Login!Answer
Select On to enable a login on the port. Select Off to prevent anyone
logging in.
Receive buffer
Adjust the slider bar to one of the values I, 4, 8, or 14. Select a lower
value if characters are being lost in incoming data. Select a higher
value to improve system performance by reducing the number of inter-
rupts that the serial port generates. See "Changing the interrupt
trigger level" in the Performance Guide for more information.
3. Click on OK to confirm.
4. Click on Close.
NOTE If the Serial Manager relinks the kernel because you changed the
I configuration of the serial ports, you must shut down and reboot the
system for the changes to take effect.
Table 21-3 and subsequent tables list the IRQ vectors and I/O addresses asso-
ciated with various serial cards. Additional information for cards marked
with an asterisk (* ) is given in Appendix C, "Serial adapters" (page 527).
373
Adding serial and parallel ports
375
Adding serial and parallel ports
NOTE Some EISA and MeA machines can assign any interrupt vector to the
parallel ports. MeA machines and some others may swap the default
addresses for LPTI and LPT2.
5. If you are installing a new parallel port, select the type of card you are in-
stalling. Select the base I/O address it uses from the menu or specify a
non-standard address.
6. Unless you are installing on an MCA machine, enter the interrupt vector.
7. Relink the kernel as described in "Relinking the kernel" (page 290).
8. If you have no further changes to make, use the System Shutdown Man-
ager or the shutdown(ADM) command to shut down the system and
reboot.
Problems with slow UARTs can show up when using UUCP or cu(e) over a
modem connection at high line speeds. Examples are:
• incoming characters are lost intermittently
• UUCP generates unkillable uucico processes
• eu stops executing and will not exit
• an intermittent" double echd' is seen
These problems rarely show up when a serial port is used with a terminal.
They are more often associated with high-speed serial input over a modem
link. Avoid connecting high-speed modems to ports that are controlled by
slow serial control hardware such as 8250 or 16450 UARTs.
NOTE We strongly recommend that you use 16550 (or better) UARTs on
serial ports that are connected to high-speed modems. The 16550 has a 16-
byte receive buffer that allows it to operate reliably at much higher speeds
than the 8250 and 16450 (see Table 21-1).
See "Serial device resources" in the Performance Guide for information about
how to monitor and tune the performance of dumb serial ports.
377
Adding serial and parallel ports
NOTE You can only configure a single audio adapter in sea OpenServer
systems.
Most audio device configuration should be completed using the Audio Con-
figuration Manager. However, you must use the ISA PnP Configuration
Manager if you want to configure:
• any Plug and Play audio adapters
• non-audio devices on the audio adapter board (such as IDE or seSI ports)
See Chapter 17, "Installing Plug and Play devices" (page 311) for more in-
formation.
This topic describes how to use the Audio Configuration Manager to config-
ure audio adapters. It includes:
• "The Audio Configuration Manager interface" (page 380)
• "About the audio subsystem" (page 380)
• "Adding and modifying audio configurations" (page 382)
379
Configuring audio adapters
You can start the Audio Configuration Manager in either of these ways:
• Open the Desktop's System Administration window (double-click on the
System Administration icon) and double-click on the Audio Configuration
Manager.
• Start the SeOadmin launcher by entering scoadmin on the command line,
then select the Audio Configuration Manager.
• Enter scoadmin audio on the command line.
INOTE While any user can view the system's audio configuration, only root
can modify audio configuration.
sea OpenServer audio adapters drivers are based on Open Sound System
(OSS), a sound driver architecture for UNIX systems developed by 4Front
Technologies. Because the sea audio subsystem conforms to the ass API
(Application Programming Interface), you can run aSS-compliant audio-
enabled applications on sea systems. For more information and examples of
audio-enabled applications, see their web site:
http://www.4front-tech.com/
However, the 4Front sound drivers included in Skunkware are not sup-
ported on sea OpenServer systems; see "Compatibility with earlier sea
audio drivers" (page 386).
381
Configuring audio adapters
NOTE To save time configuring Plug and Play audio devices, write
down the configuration parameters presented by the PnP Configuration
Manager and do not relink and reboot after Plug and Play configuration.
When you start the Audio Configuration Manager, enter the configura-
tion parameters manually for your device, then continue with step 6.
The alternative is to relink and reboot after Plug and Play configuration;
your device will then be auto-detected as described in step 5. You must
then relink and reboot again after audio configuration.
Removing adapters
To remove an audio adapter configuration:
1. In the main Audio Configuration Manager (page 380) window, select the
adapter to remove and click on Remove in the Soundcard menu.
2. When the Remove window appears, click on OK to confirm the removal of
the entire configured audio system.
You can now remove the audio device from your system.
Each of these require to use the sea play and record utilities (page 381) (or
others of your choice). If you use vplay(e) or vrec(e), you must always have
a command line prompt available to control recording and playback. You
may also find it helpful to have a command line prompt available to set and
test initial levels with mixer(e), or you can use another mixing program, such
as xmmixer from sea Skunkware.
383
Configuring audio adapters
4. Start the sound input (for example, start talking or play the CD.
5. Stop the sound input and recording utility when complete.
I NOTE A "recording overrun" may result if the sound source generates data
faster than the computer can process it. See vrec(e) for more information.
If your CD-ROM drive does not have external controls, you must have addi-
tional software to control your drive for audio reproduction. sea Skunkware
includes Xmcd, an excellent audio CD control utility; other applications are
available commercially and through freeware.
5. Confirm your selections to exit the Edit menu. You can repeat Steps 3 and
4 for each audio file type.
385
Configuring audio adapters
These audio drivers are not compatible with the sea OpenServer audio sub-
system:
• 4Front drivers supplied with sea Skunkware
• 4Front ass drivers for UnixWare
However, playback and mixing utilities for older drivers do work with the
sea OpenServer audio subsystem.
Errors after initial sound reproduction
If you hear sound briefly after configuring your adapter but you immediately
receive an error and sound ceases, you probably have your interrupt vectors
(page 504) set incorrectly; for example, if they were set using utilities other
than the Audio Configuration Manager (page 380). Run the Audio Configu-
ration Manager to set them correctly.
Bus mice
Bus mice come with controller cards that are plugged into a slot in the
computer's bus. They have jumpers or switches that may need to be set to
allow the computer to communicate with the mouse correctly.
The manuals that come with your bus mouse should contain information
about the jumpers and what the correct jumper settings should be.
It is important to set the jumpers before you run mkdev mouse because reset-
ting jumpers usually requires removal and reinstallation of the mouse driver.
If you are unfamiliar with bus cards, see "Installing bus cards" (page 295).
387
Adding mice and bitpads
Check your system to see which interrupts are being used by other devices, so
you will know the interrupts you cannot use. See Table 14-1, "Typical device
interrupts" (page 275) for a list of standard interrupts. You should select the
interrupt you want to use for your mouse and set the jumpers to that inter-
rupt. You can use the hwconfig(C) command to display your current system
configuration. The interrupts in use will be under the "vec" column; be sure to
avoid using an interrupt belonging to another device. The vectorsinuse(ADM)
utility can also be used to obtain this information.
Serial mice
Serial mice (including wheel mice) are connected to either the COMl or COM2
port, or to a port in a multipart board. They usually require either 9-pin or
25-pin RS-232 connections.
If you have a COMl or COM2 port, plug the mouse into one of those ports. If
you have a non-intelligent multipart card, plug the mouse into the appropri-
ate port on the card.
It is important that you know the name of the port on which the mouse is to
be installed. COMl uses ttyIa, and COM2 uses ttyZa. Multiports that are con-
nected to COM ports have similar names but use different letters for each port.
For example, a four-port multipart board in COMl would typically have de-
vice names ttyIa, ttyIh, ttyIc, and ttyid to correspond with its four ports.
Multipart cards provided with special drivers, often called "smart cards",
have their own device names; check your multipart manual to find them.
Keyboard mice
Keyboard mice, also known as PS/2 mice (including wheel mice), connect to a
dedicated port at the back of your computer. They usually use 6-pin or 9-pin
mini-DIN connectors. Check your manual to find the port to which the mouse
should be connected.
When installing a mouse using mkdev mouse, choose the keyboard mouse
option only if you have a machine and mouse capable of using this port. On
some AT-type machines that do not have a keyboard mouse port, installing a
keyboard mouse driver causes the keyboard to lock up after booting. If this
happens, boot the previous kernel (unix. old) and remove the keyboard mouse
driver from the system using the remove option of mkdev mouse.
Configuring a mouse
To install a mouse on your system:
1. Install the mouse in the computer according to the manufacturer's instruc-
tions.
2. Log in as root, put the system into maintenance mode.
3. Select Mouse/Graphic Input Device from the devices listed by the Hard-
ware/Kernel Manager, or enter the command mkdev mouse.
4. Select Install a mouse from the menu.
5. Select the type of mouse you will use from the options listed. When
prompted:
• For a serial mouse, select the port on which the mouse is installed.
• For a bus mouse, select the type of mouse to be installed and its param-
eters. If you wish to change the default parameters, Take special care
when changing the interrupt vector for the mouse. Select an unused
interrupt vector. See "Typical device interrupts" (page 275).
• For a keyboard mouse, select the resolution you require. See "Changing
the keyboard mouse resolution setting" (page 391) and "Solving slow or
no response from keyboard mice" (page 395) for more about high reso-
lution mice.)
• For wheel mice, select an entry that contains the string "wheel".
6. Specify the terminals and multiscreens that are allowed to accept input
from the mouse. Do not specify any tty ports where mice are actually con-
nected. You may choose to allow any or all other terminals and console
multiscreens to use the mouse. The default associates the mouse with all
of the console multiscreens.
If you install more than one mouse, make sure the terminal specifications
for each mouse do not overlap. Only one mouse can be allowed for input
on a given tty.
See "Using a mouse" (page 392) for more information on sharing the
mouse between several terminals or multiscreens.
7. Relink the kernel to install the mouse driver.
8. If you have no more changes to make to your mouse configuration, quit
the mkdev utility and use the System Shutdown Manager or the
shutdown(ADM) command to shut down the system and reboot.
You can invoke the Hardware/Kernel Manager or mkdev mouse at any time
to allow or prevent input on different terminals, remove mice, or check your
current configuration.
389
Adding mice and bitpads
NOTE Many system utilities (for example, usemouse( C)) and applications
(for example, sca Shell) which use a mouse require pseudo-ttys to be
installed on the system. If you wish to run such an application, see "Testing
a mouse" (page 390). If necessary, use the mkdev ptty command to create
more than the 32 pseudo-ttys that are generated by default when an sca
OpenServer system is installed.
Testing a mouse
3. As you move the mouse and click the buttons, characters should be
echoed to the screen. For example, output might include:
1 mouse left
r mouse right
u mouse up
d mouse down
Id Iu left mouse button (button 1) pressed and released
wf wheel forward
wb wheel back
See the usemouse(C) manual page for a complete listing of usemouse
echo output.
I NOTE If you are using a two button mouse, pressing both buttons at
once emulates the middle button.
4. To stop the usemouse utility, press the interrupt key, usually <Del) or
<Ctrl)-C.
If usemouse does not produce the behavior described here, or you see the fol-
lowing error messages, your mouse is not installed correctly.
Open event driver failed:: No such file or directory Open
event driver failed:: Not enough space ... giving up
To fix the problem:
• First, verify that your mouse is supported by sea OpenServer systems.
• Confirm that you have run mkdev mouse and that your mouse selection
corresponds to the connected mouse hardware.
• Make certain the cable is attached securely and, if you are using a bus
mouse, that the adapter card is properly installed.
• If you are using a bus mouse, verify that the bus mouse card is recognized
during the boot process and that there is no conflict with the interrupt vec-
tor or base address. Check the hardware configuration information using
the hwconfig( C) command.
• If you are using a serial mouse, verify that the serial card to which your
mouse is attached is recognized during the boot process (by running
hwconfig). If the mouse is on a multiport board that uses its own drivers,
make certain the board works. Try the mouse on a COM port to eliminate
the possibility of a third-party driver being the problem.
Removing a mouse
To remove a mouse or mouse drivers on your system, use the Hard-
ware/Kernel Manager or select the appropriate option from the main mkdev
mouse menu. After you have removed the mouse or mouse drivers, the ker-
nel must be relinked for the change to take effect.
391
Adding mice and bitpads
Parameter Counts/millimeter
kbm_resolution=O 1
kbm_resolution=l 3 (default)
kbm_resolution=2 6
kbm_resolution=3 12
Parameter Counts/millimeter
kbm_resolution=O 1
kbm_resolution=l 2
kbm_resolution=2 4
kbm_resolution=3 8 (default)
Using a mouse
If a program accepts mouse input and the terminal is allowed to use a mouse,
the mouse should work when you invoke the program. If the terminal or
multiscreen is not allowed to use a mouse, or the program is not configured to
accept mouse input, using the mouse has no effect.
Remember that programs that do not accept mouse input are unaffected by
moving the mouse, even on a mouse-allowed multiscreen.
NOTE Note that other users on ttys allowed to use a mouse can use pro-
grams that accept mouse input while the mouse is busy. The programs are
unable to receive input from the mouse but should otherwise function nor-
mally.
393
Adding mice and bitpads
Installing a bitpad
I NOTE Bitpads are not supported by the X server. They cannot be used in
place of mice.
To install a bitpad:
1. Install the bitpad according to the manufacturer's instructions.
2. Log in as root, put the system into maintenance mode
3. Select Mouse/Graphic Input Device from the devices listed by the Hard-
ware/Kernel Manager, or enter the command mkdev bitpad.
4. Select Install a bitpad from the menu.
5. Specify the type of bitpad you wish to install.
6. Select the specific model that you wish to install.
7. Select the port to which you wish to attach the bitpad.
8. Specify the terminals and multiscreens that are allowed to accept input
from the bitpad. Do not attempt to allow bitpad input on any tty to which
any bitpads are physically connected or you receive an error message. You
may choose to allow any or all other terminals and console multiscreens to
use the bitpad. Press (Enter) to associate all of the console multiscreens.
Note that only one bitpad can provide input on a terminal or multiscreen.
See "Using a mouse" (page 392) for more information on sharing these de-
vices between several terminals or multiscreens.
9. Relink the kernel to install the bitpad driver.
10. If you have no more changes to make to your bitpad configuration at this
time, you can quit the mkdev utility and use the System Shutdown Man-
ager or use the shutdown(ADM) command to shut down the system and
reboot.
You can invoke the Hardware/Kernel Manager or mkdev bitpad at any time
to allow or prevent input on different terminals, remove a bitpad, or check
your current configuration.
I NOTE Some kbm_poll values lower than OxbO may cause your system to
freeze. If this occurs, increase the kbm_poll value.
After modifying parameters in space.c, you must relink the kernel and use the
shutdown{ADM) command to reboot the system. When the system boots, the
new keyboard mouse parameters take effect.
395
Adding mice and bitpads
Once you have installed the printer, configure it for the print service as
described in "Adding local printers" in the System Administration Guide. If
required, you can customize the printer spooling software as described in
"Customizing printer configuration" in the System Administration Guide.
397
Adding printers
4. Verify that you have connected the printer correctly by sending data
directly to the device.
For serial printers, enter the following command:
date> /dev/ttynn
where nn identifies the serial port you are using (for example, la for
/dev/ttyla).
You may need to specify the printer's stty(C) settings (speed, parity, data
length and so on) if these differ from the serial line's default settings, For
example, to test a 4800 baud printer on /dev/ttyla which is set to 9600 baud:
(stty 4800 ; date> /dev/ttyla) < /dev/ttyla
For parallel printers, enter the following command:
date> /dev/lpn
where n is the number of the parallel port you are using (for example
/dev/lpO).
Certain laser printers, such as the HP LaserJet, need to be sent a form feed at
the end of a print job; this tells them to eject the page. For example, for a serial
printer:
(date; echo "\014") > /dev/ttynn
or for a parallel printer:
(date; echo "\014") > /dev/lpn
Laser printers that are in PostScript mode can be tested by sending them a
PostScript file. For example, to send the file foo.ps to the serial port nn enter the
following command:
cat foo.ps > /dev/ttynn
To send the file to the parallel port n enter the following command:
cat foo.ps > /dev/lpn
Troubleshooting printers
If you do not see the expected output printed, the most likely cause is some
type of hardware malfunction. The following troubleshooting procedures
may help you to isolate the problem.
399
Adding printers
• Make certain that the system recognizes your serial port. You can verify
this by running the hwconfig( C) command, or by checking the file
/usr/adm/messages. If your port is one of the non-intelligent boards sup-
ported by the built-in serial driver, you will see a message similar to this:
%serial Ox03F8-0x03FF 04 - unit=O type=Standard nports=l
If unit=O is displayed, the serial port is considered to be COMl. If the unit is
1, the port is considered to be COM2. nports= denotes how many ports the
driver recognized on the adapter. If you connect your serial printer to the
first port on COMl, the associated device name will be ttyla. The second
device on COMl is ttylb, and so on. Devices on COM2 are named tty2a,
tty2b, etc.
Intelligent serial adapters may display different bootup messages specific
to their drivers; they may also use a different scheme for device names. The
message displayed in this case may look similar to this:
%ONBOARD Ox0230-0x023F 34 0 unit=O mem=OxOOODOOOO nport=16
Be sure to read the documentation for the adapter and its drivers before
attempting to install serial devices such as printers.
• Recheck the switch settings on your serial port. If you are using a multipart
adapter, try other lines on that card and be sure it does not conflict with the
standard COM ports. Try attaching the printer to a standard serial port,
COMl or COM2, to see if the printer and cabling are functioning correctly.
If the card is recognized, an entry will be printed that has similar information
to the entry above. The interrupt vector is listed in column 3 (or with "vec="
for the hwconfig display); make certain that it does not conflict with other
hardware.
You can now set up and customize the printer spooling software as described
in "Adding local printers" and "Configuring Hewlett-Packard network
printers and print services" in the System Administration Guide.
The Ready To Send (RTS) and Clear To Send (CTS) lines for the RS-232 serial
interface were originally intended as handshaking signals between a DTE de-
vice (computer, printer, and so forth) and a DCE device (almost always a
modem). This section describes unidirectional handshaking between two DTE
devices: a computer and a printer. The computer asserts its RTS (Ready To
Send) line when it is ready to send data to the printer. The printer asserts its
RTS when it was ready to receive data.
If the printer's input buffer is nearly full, it lowers its RTS line (connected to
the computer's CTS (Clear To Send) line). If the computer sees CTS go low, it
stops sending data until it goes high again when the printer has caught up.
Some printers use the DTR (Data Terminal Ready) line for handshaking rather
than RTS or CTS. For these devices, the cable must be wired to connect the
printer's DTR pin to the computer's CTS pin - see Figure 24-2 (page 402).
401
Adding printers
Tx 2 ~I 3 Rx
Rx3 ~.~---------- I 2 Tx
RTS4 ~I 5CTS
CTS 5 .....1 - - - - - - - -
I 4 RTS
Gnd 7
I 7 Gnd
~
CD 8
r-_ _ _ ------,
DTR20 ~
All other pins unused
Figure 24-1 RTS/CTS handshaking for 25-pin connector
Tx2 --------11.. 3 Rx
Gnd 7 7Gnd
L...--_
C_D_8 ------l ~
DTR20 -
403
Adding printers
NOTE The UUCP package must have been installed on your system to sup-
port modem connections whether these are used with cu, UUCP, SLIP or PPP.
Use the Software Manager or custom(ADM) to install this package if neces-
sary.
Supported modems
Any external 100% Hayes-compatible modem should work provided that it is
connected to a serial port that is capable of supporting modem control proto-
cols. All SCa-supported serial devices can provide modem control. Some
third-party multipart smart serial cards cannot be used as they do not support
modem control.
405
Adding modems
Installing a modem
For systems with dumb multipart serial cards, /dev/ttyla through /dev/ttylh
and /dev/tty2a through /dev/tty2p are non-modem control devices, and
/dev/ttylA through /dev/ttylH and /dev/tty2A through /dev/tty2P are modem
control devices.
Vendors of multipart smart serial cards implement their own drivers and de-
vice naming schemes; consult the documentation supplied with your smart
serial card for details.
Make sure the serial port you have chosen for your modem is recognized at
bootup (check /usr/adm/messages or use hwconfig(C)) and, if the modem is
internal, make sure that the interrupt vector (IRQ) and base I / a address of the
COM port do not conflict with any other device.
If you attempt to use both modem and non-modem control ports at the same
time you will see the warning:
cannot open: device busy
See also" Adding and configuring SCO-supported serial cards" (page 368).
NOTE When you are hooking up your modem (or any other serial device),
ensure that serial wires connected to your computer are not left hanging.
An unterminated line connected to your computer can considerably reduce
system performance. Always unplug a modem cable at the computer end,
not at the modem end.
Physical connections between a device and the system may depend on the
hardware configuration. For specific information about connecting a modem,
refer to the hardware manuals provided with the modem and with your com-
puter.
Your modem may have DIP switches to configure various settings when it is
first powered on. One of the settings may allow you to choose whether the
modem uses the default factory settings in read-only memory (ROM) or set-
tings you have written to non-volatile memory (NVRAM). If so, select DIP
switch and NVRAM settings that are close to the normal operating state of the
modem. If necessary, you can normally override these settings by sending
commands to the modem.
407
Adding modems
The factory default settings are normally suitable for installing the modem.
Do not adjust these settings until you have tested that the modem operates
successfully with your system.
Though unlikely, you may have to physically configure the modem to allow
dial-in connections as follows:
• Set the modem to auto-answer. A few modems do not have this setting
and can only make outgoing calls.
• Set the modem so that it does not answer when DTR (Data Terminal Ready)
is low, and so that it drops the current connection when DTR goes from
high to low.
• Set CD (Carrier Detect) to go high when a carrier is present, low when a
carrier is not present.
• Turn off echoing of characters sent to the modem.
• Select quiet mode so that the modem sends no response codes.
By default, you configure the local host. To configure a different host, select
Open Host from the Host menu, and choose another host.
The Modem Manager shows the details of any modems that are currently
configured on your system, and allows you to modify this configuration:
Configuring modems
You can choose how to add the configuration information for modems:
• Let the Modem Manager search for modems automatically (this page).
• Enter the configuration information for the modem manually (page 410).
409
Adding modems
NOTE A driver for the serial port must have been configured into the
kernel. If a suitable driver is not available, and the serial port is on an
Sea-supported serial card, click on Add port to define the serial card and
its ports. Follow the instructions in Configuring a serial card" (page
II
4. Click on OK to start the system searching for the modem. As the serial
port is probed, the indicator lights on the modem should flicker on and off
for several seconds. While the Modem Manager probes the serial port(s),
it updates the list of the modems that it has detected.
5. When it finishes probing the ports, select the modems to add, and click on
Add.
If the system does not detect a modem, check that the modem is connected
correctly and is switched on. Some older models of modem are not capa-
ble of being detected. If automatic detection still fails, enter the configura-
tion manually as described in Adding a modem manually" (this page).
1/
higher specification UART. Do not set the speed higher than 9600bps if
the serial port uses a 8250 UART. Select Any to use the default speed
for the serial line (this is usually 9600bps). See Table 21-1 for more in-
formation.
Modem port
Select the modem control serial device (such as tty2A) corresponding
to the port to which the modem is connected. If the port is not listed,
click on Add port to configure the serial port for your system, and fol-
low the instructions in "Configuring a serial card" (page 369).
You can enter a third-party serial device name for your serial port once
that device has been configured into your system; see your serial de-
vice documentation for installation and configuration information.
To change the speed or interrupt trigger level, or to enable or disable a
login on a port, follow the instructions in "Configuring a serial port"
(page 370).
Answer mode
Select On to have the modem answer incoming calls. This allows your
system to provide remote access PPP or incoming SLIP connections. It
enables a getty process on the serial line attached to the modem to
allow incoming connections to log into your system.
Select Off if you want to prevent your system accepting incoming calls.
3. Click on OK to accept the configuration.
Removing a modem
To remove the configuration information for a modem, in the Modem Manag-
er:
1. Select the modem to remove.
2. Select Delete from the Modem menu.
3. Click on OK to confirm.
411
Adding modems
If you want to enable XON /XOFF when using the modem for cu(C), you must
define an alternative dialer to that used with UUCP. This can be done by
modifying and renaming the Dialers file entry, or by modifying and renaming
the dialer program, such that you have one dialer definition for UUCP and
another for cu. See the sysfiles(F) manual page for instructions.
3. If you are going to use the line for dial-out, ensure that the serial port is
owned by uucp, for example:
chown uucp /dev/ttylA
chgrp uucp /dev/ttylA
4. If you intend to use the modem for dial-in, check the /etc/inittab file and
confirm it has an entry for your port similar to this:
SelA:2:off:/etc/getty -t60 ttylA m
/etc/inittab determines whether the port has a login prompt and defines the
serial line characteristics. There should already be an entry for the line you
are using; all you need to do is check the last field. This field is a number
or letter (label) from the /etc/gettydefs file. See Table 21-1 for a list of the
more commonly used labels.
Do not alter any fields other than the gettydefs label. For example, if you
want to connect to the modem at 19,200bps on the first standard serial
port, the line should be similar to this:
Se1A:2:off:/etc/getty -t60 tty1A n
If you make any changes, use the following command to check the entries:
grep -i tty /etc/inittab
where tty is the serial port being used. This should generate only two
lines: one for the modem control port (such as ttylA) and one for the non-
modem control port (such as ttyla).
For more information on the /etc/inittab file and the various control codes,
see the getty(M) and inittab(F) manual pages.
5. Duplicate any changes you make to /etc/inittab in the /etc/conf/init.d/sio file.
Add the correct entries to the /usr/lib/uucp/Devices file. This file should have
two entries for each serial port being used for a modem. One of the entries
is used when you start a call using the modem (the Automatic Calling
Unit (ACU) line), and the other line is used to connect directly with the
modem to issue commands manually (the direct line). For a
Hayes-compatible modem connected at 19,200bps on COMl, the entries in
/usr/lib/uucp/Devices should be:
ACU tty1A - 19200 /usr/lib/uucp/dialHA24 \T
Direct tty1a - 19200 direct
The /usr/lib/uucp/dialHA24 entry is the dialer program for the modem. Two
types of dialer programs are included to support a wide variety of
modems; see "Using dialers" (page 414) for more information.
Now follow the procedures in "Configuring UUCP for modems" (page 414)
and "Testing your modem connection" (page 421) to complete the installation
of your modem.
413
Adding modems
Using dialers
For dialing, both ell and UUCP use a dialer defined by an entry in
/usr/lib/uucp/Devices. The dialer can be:
• an entry in the /usr/lib/uucp/Dialers file, see "Dialers file entries" (page 415)
• a symbolic link to atdialer together with a suitable configuration file in
/usr/lib/uucp/dejault, see "atdialer and dialer programs" (page 416)
• a stand-alone program such as /usr/lib/uucp/dialHA12, see "atdialer and
dialer programs" (page 416)
I NOTE If you intend to use an outgoing PPP link over a modem that uses the
"hayes2400" entry in the Dialers file, change the word Speed to CONNECT.
The following Dialers file entry, standard, should also be suitable for many
V.32bis and higher speed moderns:
standard =w-,"" AT&F1 OK\r ATBOM1X4 OK\r ATDT\T\r\c CONNECT
Although it is possible to create or modify an entry in the Dialers file yourself,
the syntax can be difficult to follow. Consult the Dialers{F) manual page for
more information.
415
Adding modems
Table 25-2 lists symbolic links to atdialer and dialer programs provided with
SCQ OpenServer systems. Both atdialer and the dialer programs are supplied
in binary and source form.
The sections that follow explain how to create both types of dialers.
Alternatively you can use the make.dialer script to create an atdial dialer. See
make.dialer( e) for more information.
417
Adding modems
If you use hardware flow control with the modem, and the modem is capable
of performing speed conversion, do not use the RTC_speed strings. Instead,
use the RTC_CONNECT string and set it to the value "CONNECT". This will
give you the fastest available connection speed. The computer to modem
speed will be set by the value in the /usr/lib/uucp/Devices file.
The source and a makefile for recompiling dial binaries are included in the
directory /usr/lib/uucp. If you have any other kind of modem, you can modify
any of the source files and create your own dialer program.
NOTE You must have installed the sea OpenServer Development System
Ibefore you can compile a dial program.
3. Edit the file makefile in the directory /usr/lib/uucp and find the line that
reads:
EXES= dialHA12 dialHA24 dialHA96V dialMUL dialTBIT dialT1500 dialVA3450
Add the name of the dialer program that you wish to use. When this is
done, exit the file, saving the changes you made.
419
Adding modems
Modems can usually be configured to use hardware flow control. For exam-
ple, the atdialHAY dialer supports RTS/CTS flow control using the &K3 com-
mand.
The CTSFLOW flag is often used by itself to prevent the modem buffer from
overflowing when speed conversion is used for incoming calls. For example,
assume a MultiModem V.32 is set for a fixed speed of 9600bps to the com-
puter. When a 2400bps connection calls in, the computer sends data to the
modem at 9600bps, which the modem can only send out at 2400bps. The
CTSFLOW flag in /etc/gettydefs tells the serial driver to stop sending data when
the modem drops CTS. This allows the modem to signal when it is busy and
prevent data overruns.
3. Establish a direct connection to the modem so that you can send com-
mands to it. This connection uses the "Direct" line in the Devices file. For
example, if the modem is connected to a single port on COMl, enter the
following command:
eu -lttylA dir
You should see a message such as OK (Hayes-compatible modems) or 0 to
indicate that the modem is ready to accept commands.
If you see the message eu: dir permission denied, you do not have write
permission on the /usr/lib/uucp/Devices file. Set the correct ownership and
permissions using the commands:
ehown uuep:uuep /usr/lib/uucp/Deviees
ehmod 644 /usr/lib/uucp/Devices
If you do not see a message indicating that the modem is ready to accept
commands:
• Check that you entered the eu command correctly.
• Ensure the "Direct" entry in the Devices file is correct.
• Use the hweonfig command to check that the serial port is configured.
• Use the I command to check that the device files associated with the
port (such as /dev/ttyla and /dev/ttylA) have owner and group both set
to uucp. If not, change these using the commands:
ehown uuep:uucp /dev/ttyla
ehown uucp:uuep /dev/ttylA
421
Adding modems
Enter:
AT
Check
cable/switch
settings
Enable
echo:
ATE1
Try other
ports, inc
tty 1A, tty2A
4. If you see a message from the modem indicating that it is ready to accept
commands, enter AT. A Hayes-compatible modem should return OK. If
you have set the modem to return numeric result codes rather than text,
you see o. If you do see OK, your modem is ready to dialout.
5. Check that the "Send Data" light on the modem flashes when you press a
key. This indicates the modem is receiving signals from the computer. If
this light is not flashing, check your cable and modem switch settings. If
the "Send Data" light flashes, but you still do not get an OK response from
the modem, enable the modem's echo capability and responses to com-
mands by entering ATEIQO
If you have any problems, see HProblems dialing out" (page 424).
423
Adding modems
If you have any problems, see "Problems dialing in" (page 427).
Troubleshooting modems
If you have problems, first verify that the phone jack is plugged in and that
you have a dial tone on the phone line. Note that, while other serial ports are
often used, the examples in this section assume that the modem is attached to
COMl.
If you find that you are losing incoming data on a high-speed modem, follow
the tuning advice given in "Configuring your system for high-speed modems"
in the Performance Guide.
425
Adding modems
root must remove the lock file before anyone can use the modem again.
2. If the CD (Carrier Detect) light on the modem does not go off when the call
is disconnected, check the modem switches to verify that the modem is set
to detect the incoming carrier. If your modem is Hayes-compatible, use
the AT &Cl command. This forces the carrier detect line to follow the pres-
ence of a carrier on the phone line.
3. Check the modem switches to verify that the modem is set to detect DTR
(Data Terminal Ready). The modem should hang up when DTR goes from
high to low. If the modem is Hayes-compatible, use the AT&D2 com-
mand.
4. Some modems have a switch that can be set to ignore DTR; make sure that
this switch is off.
Double echo
If you get a double echo when you dial out on your modem, check the setting
for local echo. If local echo is enabled, disable it.
Problems dialing in
You may experience one of the following problems on dialing out:
• "Modem does not answer the phone" (this page)
• "NO DEVICES AVAILABLE message" (page 425)
• "Garbage or loose cable" (page 428)
• "Modem answers, but no login prompt is displayed" (page 429)
• "'Screen displays a series of login prompts" (page 429)
• "System displays meaningless characters" (page 430)
427
Adding modems
3. Verify that the DTR (Data Terminal Ready) line is connected from the com-
puter to the modem. Make sure that pin 20 is connected. Pins 2, 3, 7, 8,
and 20 are required for modem communication.
4. Make certain the ACU entry for this modem in the Devices file precedes any
"Direct" entries for the port or the non-modem control counterpart.
3. Verify that the entry for the incoming line in the /etc/inittab file is correct.
The entry defines the characteristics of the getty process that monitors the
modem control port. The final argument to the getty command is a single
letter or digit that references an entry in the /etc/gettydejs file. This defines a
range of speeds, parity, number of stop bits, and so on, that can be used on
the line.
Refer to Table 21-1 for information about the limitations on the speed of a
serial port that are imposed by the UART (universal asynchronous
receiver / transmitter) chip that controls it.
For details of the capabilities of ports on intelligent serial boards that use
third-party device drivers, refer to the manufacturer's documentation.
For example, the following entry in inittab spawns a getty process to allow
incoming connections at 9600bps on the modem control port /dev/ttylA:
Se2A:2:off:/etc/getty -t60 ttylA m
For more information on the /etc/inittab file and the various control codes,
see the init(M), inittab(F), getty(M), and gettydefs(F) manual pages.
NOTE Each time the kernel is relinked (when a driver is added or a tun-
able parameter is changed), /etc/inittab is reconstructed from the entries
found in /etc/conf/init.d/sio.
Duplicate any changes you make to /etc/inittab in /etc/conj/init.d/sio.
429
Adding modems
Before you add a serial terminal to your system, follow the instructions in
your terminal's manual for connecting the terminal to a serial line. (If you add
a serial card, the possible names of the additional device files are listed in
serial(HW) or in the documentation for cards that include driver software.)
Many types of terminals are supported; see the terminals(M) manual page for
a comprehensive list. Support for terminals is provided through the
terminfo(M) database, which contains the definitions and classifications of
keystrokes and control sequences which vary from terminal to terminal. For a
description of the terminfo database, see the terminfo(M) and terminfo(F) man-
ual pages.
431
Adding serial terminals
(page 368) for information on how to configure the serial ports for termi-
nal connections.
2. Make sure you are logged in as root in multiuser mode.
3. Plug in your terminal and turn it on. Set its input and output speeds to
9600bps (or higher, see step 5 below), 8 data bits, 1 stop bit, no parity, full
duplex, and XON /XOFF handshaking (software flow control). If your ter-
minal does not work in this mode, look for advice on configuring your ter-
minal in the stty( C) manual page.
Most terminals will be connected directly to the computer using a cable,
although it is possible for terminals to connect to the system via a modem
link. DTE-type terminals connected directly to a DTE-type serial port, or
DCE-type terminals connected directly to a DCE-type serial port require a
cable in which the Transmit Data (TD) pin on the serial port is connected to
the Receive Data (RD) pin on the terminal, the RD pin on the serial port is
connected to TD pin on the terminal, and the Signal Ground (SG) wire is
connected straight through.
DCE-type terminals connected to a DTE-type serial port, or DTE-type ter-
minals connected to a DCE-type serial port require a cable in which these
three wires are connected straight-through.
It may also be necessary to link the Data Set Ready (DSR), Data Terminal
Ready (DTR), and Carrier Detect (CD) pins in the connector at the
computer-end of the cable if the serial port hardware requires this. The
operating system requires only that pins 2, 3, and 7 are connected if soft-
ware flow control is used.
For more information, see the serial(HW) manual page.
4. Enable the terminal using the enable(C) command. For example:
enable tty2a
The enable command starts a getty process that displays the log in:
prompt on your terminal.
5. Check that the entry for this serial port in the /etc/inittab file looks like the
following example for /dev/tty2a:
Se2a:234:respawn:/etc/getty tty2a m
The /etc/inittab entry should appear as above. If the entry does not look
like this example, edit the file to correct it. See inittab(F) for information on
the /etc/inittab format.
The last field in the /etc/inittab entry is a line-mode label from an entry in
the /etc/gettydefs file. In the example above, "m" corresponds to the
9600bps entry in /etc/gettydefs. The maximum speeds that the serial driver
supports depends on the characteristics of the underlying serial port hard-
ware as shown in Table 21-1 (page 371). Entries in /etc/gettydefs for speeds
from 230,400bps to 921,600bps may be used if supported by third-party
serial drivers and hardware. For more information, see "Changing default
terminal line characteristics" (page 436).
6. If the port is enabled, press the (Enter) key a few times to see if a login:
prompt appears. If so, you are ready to log in. If the prompt does not
appear, see "Testing a terminal connection" (this page).
433
Adding serial terminals
5. If you have typed the enable and disable commands many times, it is
possible that a new getty cannot be spawned on that port. If so, shut the
system down, reboot, log in as root in multiuser mode, and try again. For
more information, see "Setting the terminal type at login" (page 439).
Enter: yes
date> /dev/Hynn
yes
Check
terminal's cable,
configuration
and port
connection
yes Enable
tty
port
no
no
Try
another
port
Check for getty:
ps -t nn
Replace
defective
serial card
Replace
Does yes defective
getty terminal/
Swap cable exist? cable
and terminal
with working
terminal
no
Replace Reboot
faulty and
terminal re-enable
cable tty
435
Adding serial terminals
getty automatically executes as part of the login process. The table of termi-
nal settings is found in a file called letc/gettydefs. You can edit letc/gettydefs to
add different sets of terminal characteristics or to change the existing ones.
See the gettydefs(P) manual page for a description of the format of this file.
You can edit letc/gettydefs to add new terminal settings or to change existing
ones. For example, the settings for terminal lines might look like the follow-
ing:
4 # B2400 HUPCL # B2400 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@!login: # 5
5 # B4800 HUPCL # B4800 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@!login: # 6
6 # B9600 HUPCL # B9600 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@!login: # 4
This example can be edited so that the first speed that getty attempts is
1200bps:
4 # B1200 HUPCL # B1200 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@llogin:# 5
5 # B4800 HUPCL # B4800 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@llogin:# 6
6 # B9600 HUPCL # B9600 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@!login:# 4
You can also add additional terminal line settings to gettydefs. Flags and per-
missible values for terminal settings are listed on the termio(M) manual page.
When you add a new entry, be sure that the groups of entries in gettydefs form
a closed set, so the next-label field of the last entry directs getty back to the
first entry in the group.
The following example adds an entry for a speed of 300bps to the previous
gettydefs example:
4 # B1200 HUPCL # B1200 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@!login: # 5
5 # B4800 HUPCL # B4800 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@!login: # 6
6 # B9600 HUPCL # B9600 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@!login: # 7
7 # B300 HUPCL # B300 CS8 SANE HUPCL TAB3 ECHOE IXANY #\r\n@!login: # 4
NOTE Any settings on a port using the stty command only last as long as
the port in question is still open. As an example, if you want to change the
speed of tty2a, and tty2a is not enabled, the stty command first opens the
port, then changes the port settings, and finally closes the port. When it
closes the port for the last time, the settings revert to the original. In the stty
commands later in this section, the use of the while loop is to avoid this
behavior of stty. If you run stty redirecting input without < /dev/ttyname, it
works on your current serial line, which you have open. In this case,
because the serial line stays open after the stty command, the settings also
stay in place.
437
Adding serial terminals
You can display the current operating characteristics of a serial line by enter-
ing this command at the terminal connected to that line:
stty -a
If it is impossible to log in at that terminal, you can use another terminal to
display the characteristics. Log in as root at another terminal, and enter:
stty < ttyname
where ttyname is the name of the device special file corresponding to the
serial line (see "UNIX directories and special device files" in the System
Administration Guide).
For example, this command displays the current characteristics of the serial
line named /dev/ttyla:
stty < /dev/ttyla
The command displays the speed, the parity scheme, and other information
about the serial line. This information is explained in the stty( c) manual
pages.
One common serial line characteristic to change is the speed. This is usually
done from a terminal connected to another serial line because changing the
rate disrupts communication between the terminal and the system. Before
you can change the rate, you need to know the current speed of the terminal
(review the terminal hardware manual to see how to determine the current
speed). Once you have the speed, log in as root at the other terminal, and
enter:
(stty speed; while : ; do sleep 3600; done) < ttyname &
where speed is the current speed of the terminal, and ttyname is the name of
the device special file corresponding to the serial line you wish to change. The
speed must be one of 50, 75, 110, 134, 150,200, 300, 600, 1200,2400, 4800, 9600,
19200,38400,57600, 115200,230400,460800, or 921600. For example:
(stty 9600; while : ; do sleep 3600; done) < /dev/ttyla &
This command changes the speed of the serial line /dev/ttyla to 9600. Note
that the symbol "<" is used for both displaying and setting the serial line
from another terminal.
Another common change is the way the system processes input and output
through the serial line. Such changes are usually made from the terminal con-
nected to the serial line. For example:
stty tabs
This command causes the system to expand tabs with spaces (used with ter-
minals that do not expand tabs on their own). Another example is:
sUy echoe
This command causes the system to remove a deleted character from the ter-
minal screen when you back over it with the (Bksp) key.
Note that the sUy command may also be used to adapt a serial line to an
unusual terminal, to another type of serial device that requires parity genera-
tion and detection, or to special input and output processing.
For a full description of this command, see the sUy(C) manual page.
UNIX systems require that the terminal type be clearly defined before any
work is done at the terminal. The preferable method for setting your terminal
type is to assign the type to the TERM variable, a special environment variable
that associates the terminal you are using with a list of characteristics given in
the /etc/termcap file. The characteristics tell the system how to interpret your
terminal's keys and how to display data on your terminal screen.
If you are using the Bourne or Korn shell (sh( c) or ksh( C», the TERM assign-
ment has the form:
TERM=termtype; export TERM
If you are using the C shell (csh(C), the TERM assignment has the form:
setenv TERM term type
The termtype must be one of the names associated with one of the terminals
defined in the /etc/termcap file. The assignment must be entered at the terminal
whose type you are setting.
For example, to set the terminal type to ansi" from the Bourne shell, go to the
/I
439
Adding serial terminals
You can let the system define the terminal type automatically whenever you
log in by including the TERM assignment in your .profile file.
For an alternate method of setting your terminal type, see the manual page for
tset(C).
If you let the system set the terminal type, be careful when logging in on ter-
minals that are not the same as your normal terminal. The system has no way
of checking whether or not the terminal assignment is correct for the given
terminal and assumes that it is the same as your normal terminal. If it is not,
you must set the terminal type manually.
2. Log in as root and edit the file /etc!ttytype with a text editor. Change the ter-
minal type field for the line associated with the terminal in question to the
terminal type you desire to use. Follow the model for the console. If you
want your terminal type to be set to Iiwy50" for /dev/ttyla, edit /etc!ttytype
as follows:
wy50 ttyla
3. Edit the user's startup file to modify the appropriate tset(C) command line
to set the terminal type automatically. In each C-shell user's .login file, add
the following line:
tset -s -Q > /tmp/tset$$; source /tmp/tset$$; /bin/rm /tmp/tset$$
Be sure to remove the default setenv command line involving TERM and
TERMCAP from the .login file.
In each Bourne shell or Korn shell user's .profile, add the following line:
eval 'tset -s'
Be sure to remove the existing tset command line from the .profile file.
4. Have all users log out, then log in again to test the new terminal type
change. After they log in, have them verify the new term type by entering
the env( c) command:
env
Removing terminals
Before you can remove a terminal, you must disable it with the disable(C)
command:
1. Turn off the power to the terminal.
2. Log in as root at another terminal.
3. Use the disable command to disable the terminal:
disable ttyname
where ttyname is the name of the serial line to which the terminal is
attached. For example:
disable ttyla
disables the terminal connected to serial line /dev/ttyla.
4. Disconnect the terminal from the system.
The serial line previously connected to the terminal is now free to accept
another device.
441
Adding serial terminals
4. Edit the file /etc!default/boot (not /stand/etc!default/boot) and add the follow-
ing line to the end of the file:
SYSTTY=l
5. Reboot.
To temporarily change the system console device from the command line,
enter systty=x at the boot prompt (where x is "cn" for a display adapter or
"sid' for a COMI serial port). This does not create or change a SYSTTY entry
in the /etc!default/boot file.
The following two subsections describe how to configure your system when
you run a terminal in scancode mode at all times. If you choose to leave your
terminals in character mode, you do not need to configure your system spe-
cially to use a scancode-compatible terminal.
443
Adding serial terminals
For example, if you want to run ttyOOl in scancode mode, change the line:
OOl:2:off:etc/getty ttyOOl m
to read:
OOl:2:off:etc/getty ttyOOl sc m
For more information on modifying these initialization files, see Chapter 26,
" Adding serial terminals" (page 431).
NOTE For each Wyse 60 or Wyse 150 terminal that you want to run in scan-
code mode, change the user's environment by specifying the flwy60-pc"
TERM environment variable in the user's .login or .profile file or in /etc!ttytype.
(The Wyse 150 behaves the same in scancode mode as the Wyse 60.) For
instructions on defining the TERM variable, see the section on setting termi-
nal type earlier in this chapter.
Only Wyse terminals have the fI_pC" names; others (for example, H-P700) are
the same in scancode and ASCII mode.
After you edit the two initialization files, set the terminal itself to scancode
mode (some manufacturers refer to flpe-personality"). Consult your terminal
documentation for instructions on setting this mode.
I NOTE scanon does not run mapstr, so if you use scanon you also have to
run mapstr to use the function keys, numeric pad and arrow keys.
The syntax for the setkey command is setkey keynum string. The setkey
command assigns the specified ANSI string to be the output of the function
key keynum. For example, for function key 1 «FI» to output the string fldate",
use the command: setkey 1 "date". For a key assignment to last beyond the
current login session, place the setkey command in your .login file.
mscreen
The mscreen(M) (terminal multi screen) utility can be used on scancode-
compatible serial terminals, but you should note that when it is used on a
Wyse 60 terminal, the screen must be refreshed after a screen switch. This is
because the Wyse 60 does not support hardware page switching when in PC-
compatible mode.
You should also note that when running under mscreen, although the termi-
nal itself may be in scancode mode, the login sessions are running on pseudo-
ttys, which receive ASCII data from the mscreen utility. The effect of this is
that applications that normally run in scancode mode, such as Microsoft
Word, will actually start up in ASCII mode.
usemouse(C)
The usemouse( C) utility can normally be used on a serial terminal in scancode
mode, using the same default map file or application-specific map files (in
/usr/lib/mouse) as the console. However, when running on a Wyse 60 terminal
in PC-TERM mode, use the same map files as when running on a Wyse 60 in
native mode.
445
Adding serial terminals
Troubleshooting terminals
If you are having a problem with a serial terminal, see:
• "Restoring non-functional terminals" (this page)
• "Fixing hung terminals" (page 447)
• "Fixing scrambled terminal display" (page 448)
• "Unlocking locked terminals" (page 448)
• "Restoring non-echoing terminals" (page 448)
• "Correcting hung scancode-compatible terminals" (page 449)
• "Wyse 60 terminal in scancode mode" (page 449)
5. Verify that there is a getty process associated with the terminal port. For
example, enter:
ps -t tty2a
If this fails to restore the non-functional terminal, check the terminal's docu-
mentation for troubleshooting suggestions.
If the ps -t command shows only a getty program, the terminal should display
a login prompt. If it does not, check the terminal hardware again.
447
Adding serial terminals
The terminal should now display keyboard input. If it does not, follow the
steps outlined in "Restoring non-functional terminals" (page 446).
If you want to restore both your terminal and line discipline to PC-scancode
mode, enter the following scanon command, where ttyline is the tty of the
hung terminal:
scanon /dev/ttyline
If you want to restore both your terminal and line discipline to character
mode, use the scanoff command:
scanoff /dev/ttyline
You do not need to be root to use scanon and scanoff to affect your own tty.
For more information on scanon and scanoff, see the scanon(M) manual page.
449
Adding serial terminals
NOTE When you install sca OpenServer, you are given a choice of MMDF
or SendMail as your Mail Transport Agent (MTA). To use the Internet Man-
ager to configure electronic mail, you must choose SendMail. SendMail
gives you full access to multihoming and other advanced mail features not
available from MMDF.
If you installed MMDF, but now want to use SendMail, use the Software
Manager (page 69) to remove the MMDF package, then add the sendmail
package.
See also:
• Chapter 9," Administering sea systems" (page 137)
• Chapter 28, "Managing virtual domains" (page 473)
453
Configuring Internet services
NOTE If you defer setting the root password during the initial installa-
I tion procedure, the admin user's password is set to (Enter).
2. In the "User ID" field, enter admin. In the "Password" field, enter the Inter-
net Manager password.
In addition to selecting an interface, you are given the option of whether the
system should test your connection. It will do this by attempting to contact a
known system on the Internet. If you do not want the system to perform this
test (if, for example, you are configuring your system for use on a LAN that
has no Internet connection), deselect the Test Internet connection checkbox.
Once you click OK, the system tests your connection (unless you have chosen
not to do so) and configures several system services, such as the Domain
Name System (DNS). If the test was successful, your system is on the Inter-
net, and you are ready to configure specific system services, as described in
"Configuring Internet services" (page 463). If the test is unsuccessful, you can
chose to Reconfigure the settings. If the system timed out before the
connection/ dial completed, click on Try Again.
455
Configuring Internet services
NOTE The Internet Manager is designed to configure sca PPP from Morn-
ing Star Technologies, which you must install separately after installing sca
OpenServer. See the discussion of Internet Services components (page 33).
in the installation procedure.
If your ISP does not provide you with these IP addresses, then the addresses
are assigned to you dynamically each time you dial in, and you do not need to
know them. However, you must enter the IP addresses when you create the
link (the addresses you enter will be replaced with the correct ones when you
dial in). If your ISP does not provide you with initial addresses to use, use
127.0.0.2 for the local site and 127.0.0.3 for the remote site.
You might also need to know the following additional security information:
• PAP / CHAP name
• PAP/CHAP secret
• chat script login sequences
Again, your ISP will give you this information if it is required to create the
connection. In many cases, it is not required.
See also:
• "Creating an outbound PPP connection" (this page)
• "Configuring an inbound PPP Connection" (page 459)
• "Troubleshooting your PPP connection" (page 461)
The Internet Manager page for configuring an outbound PPP connection con-
tains three sections.
If your ISP or network administrator has given you IP addresses for your sys-
tem and / or the remote system, enter them here; otherwise, choose default
addresses and select Dynamic to indicate that IP addresses are to be reassigned
dynamically. You must also enter your login name and password. If you are
using a modem to make the connection, enter the remote phone number.
457
Configuring Internet services
If you are using a modem to make the connection, select the modem type
from the list provided. If your modem does not appear in the list, try one of
the generic settings.
You also need to specify whether the line should stay up all the time, or if it
should only come up automatically when packets need to be routed across the
link. Do this by setting how many seconds the connection needs to be idle
before it times out and hangs up. If you are using a part-time connection, the
correct timeout value depends on the cost of your phone connection; for many
situations, a value of 120 is reasonable. Entering a value of zero (the default)
causes the line to stay up continuously. You can also instruct the system to
dial the connection every time the system boots.
Optional information
You might also want to specify certain optional parameters. If your ISP or net-
work administrator gives you PAP / CHAP authentication information, enter it
here. FinallYi you must verify the netmask, which is necessary for the system
to properly route packets. A default value of 255.255.255.0 is appropriate for
a class C network and is commonly used; you should change it only if your
ISP or network administrator instructs you to do so.
In most cases, a LAN connection is desirable for Morning Star PPP servers. If
you require a LAN connection for your server, enable it using the Network
Configuration Manager before configuring PPP with the Internet Manager.
For more information, see Chapter 28, "Configuring network connections"
(page 000).
If you do not need LAN access for your Morning Star PPP server, you can
work around the Ethernet requirement by creating a non-functional Ethernet
configuration file. To do so, enter:
touch /usr/internet/admin/.initdone
Then, restart the ncsa_httpd daemon:
/etc/rc2.d/S91mana http stop
/etc/rc2.d/S91mana http start
Finally, configure dial-in Morning Star PPP connections with the Internet
Manager. The .initdone file will be overwritten if you add LAN connections
later.
459
Configuring Internet services
Enter the number of seconds you want to allow the link to be idle before the
system drops the connection. If you enter zero, the system will not drop the
connection because it is idle; if you want a part-time connection, enter the
timeout period (120 seconds is a reasonable value).
If you require that the remote system authenticate itself using PAP / CHAP,
enter the PAP / CHAP name and secret. Finally, enter the appropriate netmask
to use for this link; a value of 255.255.255.0 is appropriate for class C net-
works and is commonly used. If your network uses a different netmask, enter
it here.
Once you click on OK, the PPP link is ready to use, and a remote system
should be able to connect almost immediately.
Troubleshooting your PPP connection
Even though the configuration of a PPP connection appears to be simple,
problems often arise. These are most often the result of making the wrong
modem selection for the modem you are using, or of the two sides of the con-
nection not agreeing on all the necessary parameters.
Determine that the configurations for both sides of the connection are con-
sistent. For example, they must agree on the account name and password,
and the netmask for the connection must agree. Check your IP addresses to
make sure they are consistent. If this is an incoming connection, be sure that
you do not make the IP address for a system as specified on both sides of the
connection dynamic, as neither system will tell the other which IP address to
use.
It is often useful to watch what the PPP daemon is doing on your system
when it attempts to make the connection:
1. If you are configuring an outgoing connection, edit the
/usr/lib/mstppp/Autostart file. If you are configuring an incoming connec-
tion, edit the /usr/lib/mstppp/Accounts file.
2. Look for the entry corresponding to the connection you are trying to
debug. Incoming entries can be identified by account name. Outgoing
connections can be identified by the IP addresses of the local and remote
systems (dynamic IP addresses are specified by a " -" character).
3. Add debug # to the end of the line, where # is a number between 1 and 11
(higher numbers produce more debug information). debug 5 is a recom-
mended starting point.
461
Configuring Internet services
4. Save and close the file. If you are debugging an outgoing link, you must
kill and restart the PPP daemon:
• To kill the PPP daemon, enter these commands:
ps -ef I grep pppd I grep -v grep
kill processID
where processID is the second column of the output from the grep
command.
• To restart the PPP daemon, enter these commands:
cd /usr/lib/mstppp
./Autostart
5. Enter these commands at the UNIX prompt:
touch /usr/adm/pppd.log
tail -f /usr/adm/pppd.log
6. Attempt to bring up the connection. To bring up a outgoing connection,
use ping(ADMN) to contact the remote system's IP address. To bring up
an incoming connection, have the remote system dial in.
7. Watch the output of the tail command for debug information.
Particular things to watch for are account names and passwords that are
incorrect. Also, if one end of the connection is expecting a string to be sent by
the other (for example, log in:) and the other side sends something else (for
example, username:), this is a problem. If you have such a problem, you can
use the Internet Manager to modify the chat script by clicking on the Net but-
ton on the Internet Services page, then clicking on the PPP Connections but-
ton. If more than one dial-out connection is configured, select the dial-out PPP
connection you are debugging, then click on the Advanced button. The login
chat script can be modified from that page. Alternatively, you can modify the
/usr/lib/mstppp/Systems file, where the chat script is stored. The format of each
of the configuration files is described in the corresponding man page:
ppp.Accoun ts (MST_PPP), ppp.Auth(MST_PPP), ppp.Devices(MST_PPP),
ppp.Dialers(MST_PPP), or ppp.Systems(MST_PPP). If you have a complicated
chat script, the Internet Manager might not be able to configure the connec-
tion after the chat script is modified.
When you reach the Internet Services page, important Internet services have
already been configured for you:
Caching Domain Name Service
DNS enables your system to act as a name server for your local network,
minimizing delay and network traffic.
World Wide Web
The Netscape FastTrack Server serves a default home page on the Web.
E-mail
Your system can send and receive e-mail, and any users on your system
have POP accounts automatically set up for them.
File transfer
The system allows password-protected FTP access for users on the sys-
tem.
463
Configuring Internet services
See also:
• "Configuring services" (page 475)
Web
When you click on the Web button, the Internet Manager displays a list of
Web servers you have installed.
NOTE If you change the password for the Internet Manager, the passwords
for the Netscape administration utilities are not changed. To change the
passwords for the Netscape administration utilities, you must change them
from within those utilities.
See also:
• "Netscape Web server installation defaults" (this page)
• "Starting and restarting Netscape servers" (page 466)
• "Deferring or reconfiguring network configuration" (page 467)
• "Manually configuring Netscape servers" (page 469)
465
Configuring Internet services
Home page
Netscape FastTrack Server:
/usr/internet/ns_httpd/docs/index.html
Index files index.html or home.html recorded in the server's
root (rather than syslog).
administration username Set to admin.
administration password Set to the root user's password at installation of
server product.
To stop and restart the Netscape servers, use the following commands as root:
Netscape FastTrack Server
/usr/internet/ns_httpd/httpd-80/stop and
/usr/intemet/ns_httpd/httpd-80/start
If a secure server is configured:
/usr/internet/ns_https/https-443/stop and
/usr/internet/ns_https/https-443/start
Netscape Proxy Server
/usr/internet/ns_proxy/proxy-8080/stop and
/usr/internet/ns_proxy/proxy-8080/start
For more information, see the Netscape FastTrack Server documentation (but
note that the server files are installed in /usr/internet/ns-httpd on sca Open-
Server).
Deferring or reconfiguring network configuration
During sca OpenServer installation, Netscape servers are configured with
settings for Server Name, Hosts, and Addresses by default. If you defer
TCP lIP configuration during initial system installation or you reconfigure
TCP /IP, any Netscape servers installed on your system might be improperly
configured.
To configure your Netscape server after deferring or reconfiguring network-
ing configuration, edit the following files:
Netscape FastTrack Server:
• In /usr/internet/ns_httpd/admserv/ns-admin.conf, set "ServerName" to
the string returned by hostname{ADMN). Set "Hosts" and
" Addresses" to the hostnames and IP addresses allowed to administer
this server. After you set these configuration variables, you can use
the Netscape administration server to further configure the server.
In /usr/internet/ns_httpd/httpd-80/config/magnus.conf, set "ServerName"
to the string returned by hostname. Then copy this file to
/usr/internet/ns _httpd/admserv/httpd-80/magnus.con! The timestamp on
the former file must be the same or earlier than that on the latter.
• If you have enabled virtual domains, edit
/usr/internet/ns _httpd/httpd-BO.ipaddress/config/magnus.conf, where
ipaddress is the primary IP address for the system. Set "ServerName"
to the string returned by hostname. Then copy this file to
/usr/internet/ns_httpd/admserv/httpd-80.ipaddress/magnus.con! The
timestamp on the former file must be the same or earlier than that on
the latter.
467
Configuring Internet services
These variables are tuned with the Hardware/Kernel Manager or the config-
ure(ADM) command; see the Performance Guide for more information.
469
Configuring Internet services
Mail
When you install sea OpenServer, you are given a choice of MMDF or Send-
Mail as your Mail Transport Agent (MTA). To use the Internet Manager for
configuring electronic mail, you must choose SendMail. SendMail gives you
full access to multihoming and other advanced mail features not available
fromMMDF.
If you installed MMDF, but now want to use SendMail, use the Software
Manager (page 69) to remove the MMDF package, then add the sendmail
package.
The system is configured so that any incoming mail destined for your system
is either delivered locally (if the destination user exists) or is rejected; if the
system receives any mail destined for another system, it forwards it on to that
system. Any mail addressed to postmaster is delivered to the root user as well
as to those users you have designated postmaster.
By clicking on the Mail button on the Internet Services page, you can change
the configuration of e-mail forwarding and host hiding (what gets shown on
the HFrom:" header for outgoing mail). If you have a central system that has a
full user database for your domain, you can choose to forward Hlocal mail" to
that host. In addition, you can specify a system to which all mail outside your
domain is delivered. It is intended that this system has good Internet connec-
tivity and is well able to handle large amounts of SMTP traffic.
FTP
load files from a system by users that are unknown to that system; no authen-
tication is required. If you have ever downloaded a file from the Internet
using your Web browser, you probably have used anonymous FTP.)
By clicking on the FTP button on the Internet Services page, you can deter-
mine whether FTP access is permitted at all, as well as whether anonymous
users can download or upload files.
Net
By clicking on the Net button on the Internet Services page, you can configure
your system's network connections.
By selecting Network Routing, you can change which network interface the
system uses as your route to the Internet. If you want to make your default
route a PPP connection, you must first configure that connection - see
HUsing a modem to connect to the Internet" (page 456). You can also specify
that your system is a gateway. If you configure your system as a gateway, it
will forward data packets received on one interface to another interface if
appropriate. Otherwise, all received data packets not destined for this system
are discarded.
You can configure both inbound and outbound PPP connections by selecting
PPP Connections. The procedure for adding and configuring PPP connections
is described in HUsing a modem to connect to the Internet" (page 456).
471
Configuring Internet services
Security
By clicking on the Security button on the Internet Services page, you can
change the Internet Manager password and specify which systems are
authorized to use the Internet Manager. Initially, the password for the Inter-
net Manager is the same as the root password. You can change the password
by clicking Set Internet Manager Password on the Security page.
NOTE Changing the password for the Internet Manager does not change
the passwords for the Netscape server administration utilities. These must
be changed from within those utilities.
The Internet Manager uses only the first eight characters of your password.
The system is initially configured to allow access only from the system itself
(running the Internet Manager on the console display). To allow another sys-
tem or systems access to the Internet Manager, select Control Access From
Remote Sites on the Security page, then enter the system's IP address.
See also:
• "Remote administration of virtual domains" (page 480)
473
Managing virtual domains
When you enable virtual domains, you must choose which network interface
to bind the existing Internet services configuration to. You must choose one of
your network cards, a PPP connection, or the localhost interface. localhost
always has an IP address of 127.0.0.1 and can only be accessed from the sys-
tem itself; it is never routed across any network interfaces.
The behavior of the Internet Services page changes after virtual domains are
enabled. In addition to the row of buttons used to configure individual ser-
vices, the Internet Manager presents a list of interfaces to configure, as well as
a SYSTEM-WIDE option.localhost (127.0.0.1), your physical network interface(s)
and PPP connection(s) are identified as "physical" interfaces, while any virtual
domains you create (additional IP addresses you add to your system) are
identified as "virtual" interfaces.
I NOTE It is important to ensure that both the name and IP address for your
virtual domain are unique.
You can delete a virtual domain from your system by selecting the virtual
domain to delete, and then clicking on the Delete button on the Internet Ser-
vices page. When you delete a virtual domain, the Internet Manager reclaims
all resources associated with it; this includes removing any Web or FTP con-
tent, as well as any mail spool files.
NOTE If you only want to disable a virtual domain and not have the Inter-
net Manager reclaim its resources, you should lock it instead: Click on the
View button on the Internet Services page and select LOCKED. For more infor-
mation, see "Locking and unlocking an interface" (page 480).
Configuring services
You must choose one of the interfaces (or SYSTEM-WIDE) before you click on a
service button. Depending on which interface you select, a service mayor
may not be configurable. For example, PPP configuration (under Net) and
Internet Manager access control (under Security) affect the entire system, and
are only accessible when SYSTEM-WIDE is selected. Other services are only
configurable when a specific interface is selected.
See also:
• "Configuring SYSTEM-WIDE" (this page)
• "Configuring interfaces" (page 476)
Configuring SYSTEM-WIDE
475
Managing virtual domains
Configuring interfaces
The following internet services are configurable for each interface when vir-
tual domains are enabled:
Web Clicking on the Web button allows you to configure the Netscape
FastTrack Server associated with the selected interface. You can
easily use the Netscape server administration utility to configure
web service for each interface. Before enabling virtual domains,
the Netscape Web server document root directory is
/usr/internet/ip/O.O.O.O/publish/htdocs. If you configure a Netscape
Web server for an interface, the Web server document root direc-
tory is /usr/internet/ip/ipaddress/publish/htdocs, where ipaddress is
the IP address of the interface. To start the FastTrack server for a
virtual domain, enter this command as root:
/usr/internet/ip/ipaddress/ns_httpd/start
ipaddress is the IP address of the server to start or 0.0.0.0 for
system-wide server(s).
If you have configured a secure server, enter:
/usr/internet/ns_https/https-443.ipaddress/start
where ipaddress is the primary system IP address.
Mail Clicking on the Mail button allows you to manage mail users asso-
ciated with the selected interface. Each virtual domain can either
use the system-wide set of users, or have a unique set of users
associated only with that domain. This means that a single system
can have multiple users with the same name that are distinguished
by the domain with which they are associated (for example,
joe@abc.com and joe@defcom are distinct users). Before virtual
domains are enabled, mail is received wherever system mail is
configured: /usr/spool/mail/name. For each interface, e-mail spool
files for POP mail users are in:
/usr/internet/ip/ipaddress/sco_mail/spool/user_name
Where ipaddress is the interface's IP address and user_name is the
e-mail user's name. Alternatively, if the interfaces use /etc/passwd
instead of private user lists, mail to joe@abc.com and joe@defcom go
to the same system mailbox. joe is a real system user, with a full
account. When using private user lists for each interface, the users
only have POP e-mail access to their mail file. They are not regular
users on the system. They cannot use telnet(TC) to connect to
their accounts to read mail. POP mail is automatically set up for
users in the private user lists.
FTP Clicking on the FTP button allows you to control anonymous FTP
associated with the selected interface. Before enabling virtual
domains, the anonymous FTP directory is
/usr/internet/ip/O.O.O.O/scoJtp. If you configure FTP, the anonymous
FTP directory for an interface is /usr/internet/ip/ipaddress/sco Jtp
(ipaddress is the interface's IP address).
Net Configuration of network connections affects the system as a
whole, so it cannot be performed separately for each interface.
Security Access to the Internet Manager can only be configured SYSTEM-
WIDE.
See also:
• "Virtual domain name and DNS" (page 478)
• "Administrative users" (page 479)
• "Configuring e-mail" (page 479)
• "Locking and unlocking an interface" (page 480)
477
Managing virtual domains
Administrative users
Each virtual domain has an administrative user associated with it. When a
virtual domain is created, the administrative user is given ownership of
appropriate files within the virtual domain. This enables the administrative
user to update information contained within the virtual domain, such as Web
and FTP content. You can have a distinct administrative user for each virtual
domain, or one administrative user for several virtual domains. We do not
recommend that the administrative user for your virtual domains be the root
user.
The administrative user is a regular user on the system. If the administrative
account does not exist, it is created by the Internet Manager using the login
name and password supplied. System defaults for shell, authorizations, and
the like are used. The home directories for the administrative users are the
top of the file hierarchy for the virtual domain administered by that user:
(lusr/internet/ip/ipaddress/pub lish).
Use the Account Manager to modify the attributes of administrative users.
For example, you might want to limit system access of an administrative user
by changing that user's shell to rsh, rcsh, or rksh. If a user is administering
several virtual domains, you might want to give them a different home direc-
tory than the first virtual domain they are assigned. Use the Account Manag-
er to remove or retire administrative user accounts.
Configuring e-mail
You can select whether the mail service associated with a virtual domain uses
the system-wide password file to determine users within that domain or uses
a private user list. If you want user names to be the same throughout your vir-
tual domains, choose "Use system (/etc/passwd) users". If you want users
within each virtual domain to be distinct, use a private user list. If you use the
system-wide password file to define your user accounts, you must use the
Account Manager to manage them. See Chapter I, "Administering user
accounts" in the System Administration Guide for more information.
If you choose to use a private user list, you can add and delete users as well as
change their passwords by clicking on the Mail button on the Internet Services
page with the appropriate virtual domain selected.
479
Managing virtual domains
I NOTE Locking a physical interface has no effect. Only virtual domains can
be locked and unlocked.
For information about configuring network interfaces from the command line
or in scripts, see the netconfig{ADM) manual page.
New and modified network adapter drivers are made available periodically;
see" Accessing the sca Compatible Hardware Web Pages" (page 273). For the
new network features and drivers included with this sca OpenServer release,
see sea Open Server Features and Limitations.
See also:
• "The Network 'Configuration Manager interface" (page 482)
• "About network configuration" (page 483)
• "Configuring network hardware" (page 489)
481
Configuring network connections
See also:
• "About network configuration" (this page)
• "Configuring network hardware" (page 489)
See also:
• "Network adapter drivers" (this page)
• "Protocol stacks" (page 484)
• "Configuration parameters" (page 485)
The sca network adapter drivers provide a standard way for many different
protocol stacks and networking products to communicate with your
computer's networking hardware. Because these drivers conform to a stan-
dard set of parameters and interfaces, you can use a single configuration tool,
the Network Configuration Manager (page 482) to configure them.
483
Configuring network connections
Protocol stacks
Computers on a network communicate in agreed-upon ways called Hproto-
cols". Protocols dictate which signals computers use across cables, how they
tell one another that they have received information, and how they exchange
information.
Although there are many different types of networks, they fall into two gen-
eral categories:
• A LAN (Local Area Network) connects computers that are in the same
office or in adjacent buildings. All the computers on a LAN are connected
to a single cable or hub, unless they use a gateway or bridge. A computer
on a LAN can communicate directly with any other computer on that LAN.
• A WAN (Wide Area Network) connects computers over long distances
using serial lines and sometimes satellite connections. Computers on a
WAN can be several hundred feet apart or on the other side of the world
from each other. Sometimes messages must go through additional com-
puters (called "gateways", "routers", or "bridges") to reach their destina-
tion.
Because the sea network adapter drivers provide a standard way for net-
working hardware and software to communicate, you can easily configure
different protocol stacks for use on the same machine. The sea protocol
stacks that you can use with the sea network adapter drivers for LAN com-
munication include:
• sea Tep /IP (provided with some sea OpenServer products)
• sea IPX/SPX® (provided with some sea OpenServer products)
• Microsoft® NetBEUI (provided with Microsoft LAN Manager for sca Sys-
tems)
• other SCa-compatible transport stacks
The sca TCP/IP stack can also be used with these WAN communication
drivers:
• PPP (Point-to-Point Protocol)
• SLIP (Serial Line Internet Protocol)
Configuration parameters
When configuring network interfaces, you must supply configuration param-
eters that enable networking hardware to interact with other system hardware
and protocol stacks to identify your host system and transmission paths
correctly. To configure network interfaces, you must configure:
hardware Set up your adapter to work with your computer's hardware using
utilities supplied with your computer, networking adapters, and
sca OpenServer system.
drivers Configure an sca network driver to work with your adapter.
protocols Configure an sca protocol stack or serial protocol to enable com-
munication with remote systems.
When configuring network hardware, you must ensure that the networking
parameters are not already in use by other system hardware. For more infor-
mation, see "Determining parameters in use" (page 487).
Hardware configuration
There are several ways to configure your networking hardware depending on
the bus type of the adapter you are installing:
PCI PCI hardware setup is usually very simple. In most cases, no user
configuration procedures are required, although the specific setup
procedures depend on the vendor's implementation. Make sure to
run the Network Configuration Manager (page 482) after install-
ing PCI adapters into your system.
485
Configuring network connections '
Most machines can support one to four networking adapters of a given type
(depending on the type of adapter and the capacity of your machine).
I NOTE If you are configuring an ISA adapter, SCO recommends that you
note all network configuration parameters in your machine's logbook.
See also:
• ndstat(ADM) manual page
• "Interpreting ndstat(ADM) output" (page 498)
Driver configuration
Use the Network Configuration Manager (page 482) to configure a driver.
• You will be prompted for any information that the system cannot detect
automatically. You must supply parameters that match those that are
defined for the adapter and do not conflict with the settings that are
already in use by other hardware installed on your system. See Appendix
A, "Configuration parameters" (page 503) for more information.
487
Configuring network connections
You can also use the Network Configuration Manager (page 482) for protocol
configuration. Protocol configuration sets values that uniquely identify your
host system in the network and control certain aspects of data transmission.
SLIP Use the Network Configuration Manager to configure the SLIP driver
and connections.
489
Configuring network connections
NOTE If you are installing an ISA adapter in a PCI, EISA, or MCA machine,
or in a multi-bus machine with PCI, EISA, or MCA network adapters, the ISA
adapter will not appear in the list of adapters found in the system. You
must select Configure an adapter not in the list, then continue configuring the
adapter as you would in an ISA machine. See "Configuring ISA and PCMCIA
adapters" (page 490).
You must run the Network Configuration Manager (page 482) after iIi.stall-
ing PCI, EISA, or MCA adapters to configure them in your system.
The Network Configuration Manager (page 482) presents you with a list of
supported adapters arranged by vendor. Select the adapter from the list that
most closely corresponds to the one in your machine. If the Network Config-
uration Manager can search for your adapter, it asks if you want to search for
it.
491
Configuring network connections
NOTE Be sure that the configuration settings you select match the hard-
I ware settings; consult your system log for your network configuration
parameters.
Configuring protocols
Configure protocols for network adapters using the Network Configuration
Manager (page 482):
• To add a protocol:
Select the adapter that will use the protocol from the displayed list, then
from the Protocol menu, select Add New.
• To modify protocol configuration:
Select the protocol to modify from the displayed list, then from the Protocol
menu, select Modify. Enter new configuration parameters as you did when
adding protocols.
• To view protocol configuration:
Select the protocol to view from the displayed list, then from the Protocol
menu, select Examine.
I NOTE If your network interface consists of only one adapter and one
protocol, deconfiguring the protocol will also remove the adapter.
493
Configuring network connections
NOTE If you are removing protocols that are associated with other network
You should also use tools appropriate to your network transport to determine
whether your local system can reach remote systems. For more information,
see:
• "Troubleshooting TCP /IP" in the Networking Guide
• "Troubleshooting IPX/SPX" in the Networking Guide
• LAN Manager Troubleshooting and Command Reference
It may also be useful to use your DOS diagnostic utilities to verify that your
hardware is functioning correctly.
495
Configuring network connections
To ensure that the correct media connector is being used, verify the adapter's
media option by running the hardware configuration. Sometimes, the LEDs
on the back of the adapter or on a 10BaseT hub are useful. A network monitor
or analyzer can also help verify that the adapter is generating traffic on the
desired network media.
If your adapter can detect the correct media automatically, make sure the
correct cable is connected to the adapter when the machine boots and that
none of the other connectors on the adapter are being used. Ensuring that a
single cable is connected to the right media is essential for automatic media
detection to work correctly.
If an adapter set to automatically detect the correct media still does not
operate correctly, try modifying the settings to the desired media instead of
using automatic detection. For EISA and MCA adapters, this may require run-
ning the machine's setup program before rebooting your sca system.
497
Configuring network connections
Some video and network adapters might attempt to use the same shared
memory segment. This has been known to occur with network adapter using
DOOOO and the Paradise and Video 7 1024i video adapters, and it might occur
with others as well. Changing the memory I/O address on one of the devices
or setting the network adapter to use COOOO might help. Refer to your video
adapter documentation for more information.
Interpreting ndstat(ADM) output
Use the ndstat(ADM) command to examine the status of the network inter-
face. Here is an example of ndstat output:
Device MAC address in use Factory MAC Address
01:00:5e:00:00:01
FRAMES
Unicast Multicast Broadcast Error Octets Queue Length
In addition, LLI drivers are not able to take advantage of new operating sys-
tem features, such as STREAMS multithreading and access to PCI device con-
figuration information.
499
Configuring network connections
Two rules determine whether multiple transport stacks can use the same net-
working adapter. The rules apply to both Ethernet and Token-Ring adapters.
• Only one 802.3 stack can use an LLI at a time. If you intend to use two or
more 802.3 stacks and the network adapter uses an LLI driver, you must
use one networking adapter per 802.3 stack.
• Any number of Ethernet II stacks can share the same networking adapter
with one 802.3 stack.
See also:
• "Framing type" (page 519)
Configuration parameters
For information on hardware and software configuration parameters required
for basic system and network configuration, see:
• "General configuration parameters" (this page)
• "Network driver configuration parameters" (page 505)
• "Serial connection configuration parameters" (page 512)
• "TCP /IP configuration parameters" (page 512)
• "IPX/SPX configuration parameters" (page 518)
• "NetBIOS configuration parameters" (page 523)
• "LAN Manager Client configuration parameters" (page 524)
DMA channel
Some devices require that you specify the Direct Memory Access (DMA) chan-
nel that you want the adapter to use. Direct memory access permits data to be
transferred between memory and a device without the intervention of the
system's central processing unit (CPU). Each DMA chip on the system mother-
board has eight circuits (or "channels") for conveying data. DMA channel 4 is
503
Configuration parameters
reserved for use by the system. During configuration, you may choose to use
any (or none) of the channels.
Interrupt vectors
Generally, each driver on your system, including those for network adapters
and SLIP lines, must have its own interrupt vector (or "IRQ"). An interrupt
halts processing momentarily so that input/output or other operations can
occur. Processing resumes after the specific operation takes place. Conse-
quently, it is important that each device installed in your system be provided
with an interrupt setting that does not conflict with the settings used by the
hardware and other peripherals (unless the device in question supports shar-
ing of interrupts).
Unless a device supports sharing of interrupts, its interrupt vector must not
be used by any other device on the system. Refer to your networking hard-
ware documentation to determine which vectors the hardware supports. The
hwconfig( C) and vectorsinuse(ADM) commands list the hardware already
installed on your system and what vectors are already in use.
Table A·1 Typical interrupt vectors
Hardware Interrupt Vector (IRQ)
ISA, EISA, or MC machine
clock o
console (keyboard) 1
floppy disk controller 6
Hard disk controller varies
Serial ports
COMI 4
COM2 3
Parallel ports
IptO,lptl 7
Ipt2 5
504
Network driver con figuration parameters
I vector 3. Your operating system has reserved IRQ3 for the sio (serial input-
output) device.
Each hardware driver on your system that performs I/O (input/output) must
have a unique memory base address so that the system can locate it. This
memory address is a three- or four-digit hexadecimal number, must match the
settings on the adapter, and must not conflict with any other hardware on
your system. Valid base addresses are displayed when you configure your
adapter.
The II a base address is the initial address for a unique area of memory allo-
cated for input/output data control to a specific hardware adapter. For exam-
ple, Ox300, or 300, is the default I/O base address for the 3Com 3c501 network
adapter. The I/O base address must match the hardware configuration on the
adapter, and other devices must not use this I/O base address.
I WARNING If you enter an I/O base address that is already in use by another
device, you might delete that device.
505
Configuration parameters
I NOTE If you want to use the AUI port, do not plug a cable into the 10BaseT
port.
See also:
• "Cable (media) type" (this page)
506
Network driver con figuration parameters
NOTE Although it is desirable to set the ring to the highest rate possible, all
I adapters on the ring should operate at the same rate. Some older Token-
Ring adapters can only be set to 4Mbps.
Frame size
Frame size is the maximum amount of the data that can be sent out on the
network in one packet. The maximum frame size for Ethernet is fixed at
approximately 1500 bytes of data. On networks such as Token-Ring, different
frame sizes can be used. Larger frame sizes generally increase network perfor-
mance, although not all systems support larger frame sizes. If you are using a
network adapter that supports configurable frame sizes, you may want to
experiment with larger sizes in your network.
See also:
• "Cable (media) type" (page 506)
507
Configuration parameters
See also:
• ndstat(ADM) manual page
• HInterpreting ndstat(ADM) output" (page 498)
Media speed
Some Ethernet adapter drivers detect the media speed automatically,
although you can manually set it to 10Mbps or 100Mbps. Set the speed manu-
ally of hardware incompatibilities cause autodetection to fail.
508
Network driver con figuration parameters
Primary/Alternate adapter
This parameter applies to these adapters:
• IBM Token-Ring Network PC Adapter
• IBM Token-Ring Network PC Adapter II (long and short)
• IBM Token-Ring Network 16/4 Adapter
• IBM Token-Ring Network 16/4 ISA-16 Adapter
• IBM Auto 16/4 Token-Ring Network ISA Adapter
• IBM Token-Ring Network PC Adapter / A
• IBM Token-Ring Network 16/4 Adapter/A
You can install up to two Token-Ring adapters in your system. If you are
using two adapters, make sure to use the Primary-Alternate switches on the
adapters to set up one as the primary adapter and the other as the alternate
adapter. You must also ensure that the adapters are designated as "Primary"
or" Alternate" during configuration with the Network Configuration Manag-
er. Obtain switch information for these adapters from the documentation
supplied by the adapter manufacturer.
Some adapters (for example, IBM Token-Ring adapters) require that you
specify a ROM base address. Like the RAM base address, the ROM base
address specifies a specific part of ROM memory that is set aside for network-
ing use. If you have more than one adapter requiring that you specify a ROM
address, make sure that you do not assign addresses that conflict with another
ROM region.
509
Configuration parameters
Slot number
Some adapters (for example, the HP EtherTwist EISA Adapter Card/32) are
meant to be used on machines using a EISA, MCA, or PCMCIA bus. If you
install one of these adapters and the adapter is not detected in the machine,
you may be required to provide its "slot number" during the configuration
process. This number refers to the slot in which the adapter is inserted.
Source routing
IBM Token-Ring networking allows you to establish connections from your
machine to other machines in these ways:
on a local ring
A local ring is the Token-Ring physically attached to your machine.
to other rings using gateways
A TCP /IP gateway is created when you configure TCP lIP over more than
one Token-Ring adapter on the same machine. Those adapters must be
connected to different rings and have different IP subnet addresses.
TCP /IP gateways connected to Token-Ring networks in this manner will
route TCP lIP traffic to the rings without using Token-Ring source rout-
ing. Similar gateways can be set up using the OSI and IPX/SPX proto-
cols.
to other networks using a Token-Ring bridge
A Token-Ring bridge is a dedicated piece of computer hardware con-
nected to several Token-Rings. The bridge routes frames between the
rings. All Token-Rings connected via bridges will appear as a single
ring to each station on the network. Token-Ring source routing allows
your adapter to route network traffic across Token-Ring bridges regard-
less of the protocol stack used by any of the connected networks.
If you intend to connect your machine to a network that includes a bridge,
and if you intend to send information from your machine across the bridge,
you must use automatic Token-Ring source routing.
The Network Configuration Manager offers you two Token-Ring source rout-
ing options:
none Source routing is not enabled; frames are not routed beyond the
local ring.
auto Source routing is enabled; frames include source routing informa-
tion and the DLPI module performs source routing on behalf of the
protocol stack. This is the default setting.
These options are set for individual adapters; they are not global to all Token-
Ring adapters configured in your system.
510
Network driver con figuration parameters
These options take effect for all protocol stacks using the specified adapter. It
is possible for stacks to override default source routing without affecting the
source routing mode used by other stacks. In such cases, the source routing is
said to be in "stack" mode for the specific protocol stack. For example, sca
TCP /IP and IPX/SPX can be configured to use automatic source routing of a
Token-Ring adapter, while a third-party SNA product can provide stack mode
routing when using the same adapter.
Protocol stacks provide stack mode routing if the characteristics of the proto-
col prevent it from working with the general purpose sea source routing
facility, or if a more specialized source routing that is designed to work
optimally for a particular protocol is desired. Although no sca protocol
stacks currently provide stack mode source routing, third-party networking
products might contain such functionality.
See also:
• "Source routing" (page 510)
511
Configuration parameters
512
TCPI/P configuration parameters
IP address
The "IP address" identifies and differentiates a given machine from all others
on the network. It consists of a 32-bit binary number that is usually displayed
as four octets expressed in decimal and separated by periods. You must have
a unique IP address for each machine on the network. In addition, if your ma-
chine serves as a router to another network (it contains two or more network
adapters and belongs to two or more networks), you must assign each
adapter a unique IP address on the appropriate network.
NOTE The IP address differs from a MAC (Media Access Control) address in
that it is configurable. A MAC address is a 6-byte address that is unique to
each physical network adapter. This non-configurable address is assigned
by the adapter manufacturer.
The IP address consists of two parts: a network address that identifies the net-
work and a host address that identifies the particular host, or node.
513
Configuration parameters
If you are creating an entirely new network and you want to connect to the
Internet, you need to contact the Network Information Center (NIC) to have a
network address assigned; see "Domain name" (page 516) for the Network In-
formation Center address. If you do not want to connect to an outside net-
work, you can choose any network address that conforms to the syntax
shown previously. In either case, once you determine the network address,
you can then create the unique host address.
Netmask setting
The "netmask" strips the network ID from the IP address, leaving only the
host ID. Each netmask consists of binary ones (decimal 255) to mask the net-
work ID and binary zeroes (decimal 0) to retain the host ID of the IP address.
For example, the default netmask setting for a Class B address is 255.255.0.0.
514
TCPI/P configuration parameters
NOTE Always use the default netmask that the installation program
prompts you for unless you are creating a subnet (a logical division of a
physical network). If you create a subnet, also mask the portion of the
address that indicates the subnet. For example, the netmask for a machine
on a Class B subnet is 255.255.255.0. For more information, see "Creating
subnets" in the Networking Guide.
The addresses shown in the previous table are for a class B network, and are
shown as examples only; your values will be different. If you are on a net-
work that does not contain any machines running 4.2BSD systems or earlier
BSD versions, choose all ones. If such machines exist on your network, choose
all zeroes.
System name
The "system name" ("host name") should be unique on the network. It can
consist of lowercase letters and numbers, must begin with a letter, and should
be no longer than eight characters. mail and other programs use the system
name to identify the correct data destination. Some sample valid machine
names are scosysv, tcpdev, and accountl.
515
Configuration parameters
Domain name
The MMDF mail router uses the domain name" to route messages, such as
/I
mail, from machine to machine. The domain name allows your network to fit
into a hierarchical network structure. Some common domains at the top of
this hierarchy include:
Sample domain names are sco.com (the domain name used by sea) and
berkeley.edu (the domain name used by the University of California at
Berkeley).
• If you are creating a new domain and might or might not eventually con-
nect to an outside network, use the name name.UUCP, where name is the
name of your company or organization.
• If you will never attach to a network outside your company, choose
company. com, replacing company with your company name.
TCP/IP connections
This TCP /lP configuration parameter sets the maximum number of "TCP lIP
connections" .
516
TCPI/P configuration parameters
Gateway status
A machine that has interfaces (adapters or serial lines) to more than one net-
work may operate as a "gateway" between networks by forwarding and
redirecting packets from one network to another.
When you configure a second adapter under TCP /lP, you are prompted to
turn on this gateway behavior or leave your machine in the default, non-
gateway mode. If you do not make your machine into a gateway, it will con-
tinue to receive packets on each network at the specified IP addresses, but will
not forward packets between networks.
See also:
• Chapter 5, "Configuring Internet Protocol (IP) routing" in the Networking Guide
If you are connecting to any network running LLI Release 3.0 or older, then
only Ethernet-II framing can be used. 802.n framing is only allowed for sca
OpenServer network adapters. For more information on frame formats, see
"Framing type" (page 519).
517
Configuration parameters
NVT logins
The maximum value is hard-coded at the driver level and can be changed by
manually editing the NVT_MAX_LOG INS parameter in the file
/etc/conf/pack.d/nvt/nvCtune.h and relinking the kernel. See "Relinking the ker-
nel" (page 290).
518
IPX/SPX configuration parameters
Network number
The "network number", entered in hexadecimal format, is a unique number
identifying a single LAN segment; every node on the same LAN segment must
have the same network number. If the sea system is acting as a router, that
is, it is connected to more than one network segment, each connected network
segment must be assigned the correct unique network number. You may
want to change this parameter if there is a conflict between network numbers
or if the numbering conventions change.
Framing type
IPX!SPX allows you to set the type of "framing" performed by the network
adapter driver. You may want to change this parameter if you reconfigure a
network segment to use a different framing type.
The framing types supported by IPX!SPX are described in:
• "802.3 with 802.2 headers" (this page)
• "802.3" (page 520)
• "Ethernet II" (page 520)
• ilEthernet SNAP" (page 520)
• "Token-Ring" (page 521)
• "Token-Ring SNAP" (page 521)
519
Configuration parameters
802.3
The Ethernet 802.3 framing type is commonly used in Novell networks, par-
ticularly with native NetWare 2.x and 3.x servers. This framing type was de-
veloped by Novell before the IEEE 802.2 standard was complete and is some-
times referred to as H802.3 raw".
The main feature of the Ethernet 802.3 framing type is the use of the hard-
coded Oxffffvalue in the frame header. Ethernet 802.3 frames have this format:
Table A·6 802.3
Header Field Size
802.3 destination address 6 octets
802.3 source address 6 octets
802.3 length 2 octets
802.3 Oxffff 2 octets
data
Ethernet II
The Ethernet II framing type is sometimes referred to as the "XEROX PARe
version of Ethernet".
The main feature of this framing type is its simple frame structure. Ethernet II
frames have this format:
Table A·7 Ethernet II
Header Field Size
Ethernet II address 6 octets
EthemetII source address 6 octets
Ethernet II type 2 octets
data
Ethernet SNAP
Ethernet SNAP framing allows network protocol stacks to use Ethernet II
frames on IEEE style networks without modification. SNAP framing is most
commonly used for Token-Ring networks.
The main feature of this framing type is the use of three protocol headers:
IEEE 802.3, IEEE 802.2, and SNAP. Ethernet SNAP frames have this format:
520
IPX/SPX configuration parameters
Token-Ring
The Token-Ring framing type conforms to the IEEE 802.5 and IEEE 802.2 stan-
dards.
The main feature of this framing type is the SAP (Service Advertising Proto-
col) fields, which indicate the protocol type. For Novell networks, these fields
are set to OxeO, which indicates that the upper layer protocol is IPX. Token-
Ring frames have this format:
Table A-9 Token-Ring
Header Field Size
802.5 AC 1 octet
802.5 FC 1 octet
802.5 destination address 6 octets
802.5 source address 6 octets
802.5 routing information 0-18 octets
802.2 destination SAP 1 octet
802.2 source SAP 1 octet
802.2 control 1 octet
data
Token-Ring SNAP
Token-Ring SNAP allows network protocol stacks to use Ethernet II frames.
The main feature of this framing type is the use of three protocol headers:
IEEE 802.5, IEEE 802.2, and SNAP. Token-Ring SNAP frames have this format:
521
Configuration parameters
IPX/SPX allows you to specify a file from which the NVT daemon prints user
login banners. If no banner is desired, simply remove or move the file, or set
this field to reference a non-existent file. Do not set this field to null (" ").
IPX/SPX allows you to set the delay period that SAPD (Service Advertising
Protocol Daemon) should wait before responding to a Nearest Server Request.
This allows some control over the order in which servers will respond to
Nearest Server Requests. Servers that should be used first for efficiency rea-
sons should be set low. For example, on a network with native NetWare
servers, it might be desirable to set the SAP reply delay high on all sea servers
to ensure that the native servers always reply first when there are duplicate
services offered on both the sea host and the native NetWare server. (If there
are no duplicate services, a low value should be used on all servers to ensure
rapid replies.)
The default value is 1, indicating a minimal delay. The maximum value for
this parameter is 300. For more information, see NPSConjig(SFF).
522
NetB/OS configuration parameters
523
Configuration parameters
524
Appendix B
SCSI host adapters
See sea Open Server Features and Limitations for information about supported
mass storage devices.
525
SCSI host adapters
526
Appendix C
Serial adapters
This appendix contains information on serial adapters that have known prob-
lems when used with the seo OpenServer system. Adapters that are specific
to a particular architecture are so labelled.
The correct switch settings for the 8AT and 4AT are:
• As a eOMl (strapped at addr Ox160, using IRQ4) the 8AT has:
- switches 33, 35, 36, 38, 39 & 40 OFF
- switches 34, 37 ON (that is, shunted)
on the DIP switch selection:
- 5, 6 & 8 should be OFF
- all the others should be ON
527
Serial adapters
The 4AT is the same as the BAT in both the above cases, with the following
common exception: switches 39 & 40 must be ON (shunted). These adapters
come in both 8250 and 16450 versions. You must have the 16450 version.
The original CTC Versanet adapters used different addresses. Please ask your
hardware vendor for Versanet adapters strapping at the above addresses
(Ox160 and Ox218).
If you are using a single Olivetti adapter, you must configure it as COM2.
528
If you are using two Olivetti adapters, one must be configured as COM2 and
the other configured as COM1, with the COM1 port built into the M380 dis-
abled. To disable the COM1 port built into the M380, refer to the section on
"Setting Up the System" in your Olivetti Installation and Operations Guide.
COM1 COM2
5-port
I-port
5-port
I-port
5-port I-port
Because adapter addresses must not overlap in the same systems, if you have
both a Tandon and a Quadram, COM1 and the Quadram must be on COM2.
529
Serial adapters
530
Appendix D
Mice and bitpads
This appendix contains information on mice and other graphic input devices.
You should read the appropriate section if you have one of the devices listed.
I NOTE In all cases, except for the Microsoft bus mouse, use interrupt 25 in
the software if you have set the interrupt jumper to interrupt 2.
531
Mice and bitpads
532
Appendix E
Modems
This appendix contains information on known issues with different makes of
modem. You should read the appropriate section if you have one of the
modems listed.
1 2 3 456 7 8
up • • • • • •
down • •
When switch 3 is down, the result codes are sent by the modem to the termi-
nal or computer. When switch 8 is down, the modem can interpret the com-
mand being issued. This allows both MS-DOS and UNIX system communica-
tions systems to work.
Table E-1, "Hayes-compatible switch settings" (page 534) lists the function of
each switch setting.
533
Modems
The asterisks (*) indicate the switch settings required. If you have a different
modem, consult your reference manual for the proper switch settings to both
send and receive calls.
534
ATeO does not echo (modem no longer echoes what is sent to it)
ATql is quiet mode (modem does not respond with OK" after this
H
Telebit Trailblazer
If you have a Telebit Trailblazer modem or compatible, log in as root and enter
the following command:
/usr/lib/uucp/diaITBIT -z /dev/ttynn 9600
where nn is the tty number of the serial line.
535
Modems
536
Appendix F
Network adapters
See sea Open Server Features and Limitations for information about supported
hardware.
537
Network adapters
538
Appendix G
Kernel initialization check letters
Each time the kernel starts, it checks the hardware that it expects to find in the
system, initializes various kernel tables, mounts the root file system, opens the
swap device, and prints configuration information. At each stage of checking,
the kernel displays a letter (plus a message if the stage is subdivided). The
process normally pauses for a while at certain letters if lengthy checks or ini-
tialization are involved. However, if the process stops and does not continue
at a particular letter, this usually indicates a problem with the initialization of
the corresponding device driver.
The following list describes the meanings of the kernel startup letters:
D Check for 10 bits of I/O decoding by writing to and reading from the
direct memory access (DMA) controller channel 0 page table address
register (I/O port Ox87).
Perform machine-specific initializations. If the initialization stops here,
there is a hardware problem. This may be resolved by running hardware
tests available on reference or setup floppy disks from the hardware
manufacturer.
E Print configuration information for the numeric coprocessor (80287,
80387, 80487SX, Weitek, or built-in), if any. Also perform machine-spe-
cific multiprocessor memory initialization.
If a coprocessor is present but not recognized, confirm that it is properly
connected and that your hardware recognizes it. Refer to your floating
point processor documentation for available tests.
F Initialize pseudo-devices and I/O devices by calling their corresponding
driver initialization functions.
If a failure occurs at this stage, check the relevant devices to see if they
are incorrectly configured or non-functioning. Refer to the documenta-
tion for the relevant hardware for more information.
539
Kernel initialization check letters
Message Description
driverinit Initialize configured driver
BTLD init Initialize boot-time loadable driver
driverinit2 Link SCSI peripheral driver to SCSI host adapter
Message Description
oeminit OEM-specific features
cinit character lists (clists)
inoinit inodes
fsinit filesystems
fstyp init file system of type fstyp
finit file table
strinit STREAMS
ksl init kernel STREAMS linker (ksl_start)
iinit open root device, load superblock into memory and
mount the root filesystem. If the root device is a hard
disk, display configuration message. If the system hangs
here, suspect a damaged, missing, or incorrectly
configured root device. Also reset system clock from
hardware clock.
flckinit file locking
seminit IPC semaphores
msginit IPC messages
xsdinit XENIX shared data
xseminit XENIX semaphores
cfgmsginit print configuration error messages if too many groups or
open files are defined. Print a warning message if too
many memory ranges were specified at boot time.
540
I Print any machine-specific information, invoke the driver start routine
for certain devices, and print total kernel memory and user memory.
The format of the startup "I" messages is:
Message Description
driverstart Start driver
BTLD start Start boot-time loadable driver
541
Kernel initialization check letters
542
Appendix H
vi command summary
The following tables contain all the basic vi commands.
Starting vi
Command Description
vi file start at line 1 of file
vi +n file start at line n of file
vi + file start at last line of file
vi +/pattern file start at pattern in file
vi -r file recover file after a system crash
Command Description
:efile edit file (save current file with :w first)
:w save (write out) the file being edited
:w file save as file
:w!file save as an existing file
:q quit vi
:wq save the file and quit vi
:x save the file if it has changed and quit vi
:q! quit vi without saving changes
543
vi command summary
Inserting text
544
Changing and replacing text
Deleting text
Command Description
mf set marker named" f II
'f go to marker" f II
545
vi command summary
Search Finds
land next occurrence of "and", for example, "and", "stand",
"grand"
?and previous occurrence of " and"
(The next line that starts with "The", for example, "The",
"Then", "There"
(The\> next line that starts with the word "The"
/end$ next line that ends with "end"
/[bB]ox next occurrence of "box" or "Box"
n repeat the most recent search, in the same direction
N repeat the most recent search, in the opposite direction
Command Description
:s/pear/peach/g replace all occurrences of "pear" with "peach" on current
line
:/orange/s//lemon/g change all occurrences of "orange" into "lemon" on next
line containing" orange"
:.,$/\ <file/directory/g replace all words starting with "file" by "directory" on
every line from current line onward, for example,
"filename" becomes" directoryname"
:g/one/s//l/g replace every occurrence of "one" with 1, for example,
"oneself" becomes "lself", "someone" becomes "somel"
546
Matching patterns of text
Expression Matches
any single character
* zero or more of the previous expression
.* zero or more arbitrary characters
\< beginning of a word
\> end of a word
\ quote a special character
\* the character" * "
beginning of a line
$ end of a line
[set] one character from a set of characters
[XYZ] one of the characters" X", " Y ", or " Z"
U:upper;]][[:lower:]]* one uppercase character followed by any number of
lowercase characters
["set] one character not from a set of characters
["XYZ[:digit:]] any character except" X", " Y ", " Z ", or a numeric digit
Option Effect
all list settings of all options
ignorecase ignore case in searches
list display (Tab> and end-of-line characters
mesg display messages sent to your terminal
nowrapscan prevent searches from wrapping round the end or begin-
ning of a file
number display line numbers
report=5 warn if five or more lines are changed by command
term=ansi set terminal type to "ansi"
terse shorten error messages
warn display "[No write since last change]" on shell escape if
file has not been saved
547
vi command summary
548
Index
549
Archive
booting (continued) c
hanging during, 195
C: drive, 112
operating system, 170
C2 security, 142
other DOS partition, 107
cabling
partition, 107
planning, 163
restoring files, 178
printers, 399-400
startup letters, 539
terminals, 432
steps, 169-172, 175
type, 506
troubleshooting, 184-195
unterminated wire problem, 407
understanding messages, 181
cache memory
using old kernel, 184
enabling/ disabling, 283
Windows partition, 107
map not allowed for intelligent serial
XENIX partition, 107
cards,265
bootstrap program, 170, 182
caching
bootstring, srom, 283
DNS, 463
bootstrings, 276
Domain Name Service, 463
biosgeom, 336
calendar, using, 160
disable, 282
Can not fork error message, 60
ESDI,282
Cancel button, 123
generic Western Digital, 282
Cannot allocate buffer, 354
hard disk, 281
cannot create, 368
host adapter, 281
Cannot exec /bin/login: No such file or
IDA,282
directory, 191
mem,283
Cannot load floating point emulator (error
SCSI,282
2): /etc/emulator, 190
ST506,282
cannot open, 308,368
tape, 281
cannot open: device busy, 407
boot-time loadable drivers. See BTLDs, 286
Cannot open / dev / rctO, 351
Bourne shell
Cannot open /etc/inittab, message, 192
.profile, 440
can't change mode of job, error message
TERM assignment, 439 266 '
brand(ADM), 95
cards, See adapters
branding, kernel, 49
Carrier Detect, CD, 432
bridges, Token-Ring, 510
light, modem problems, 427
broadcast address, 515
line, modem configuration, 408
NetBIOS, 523
CD-ROM
broken links, 261
adding drives, 307
BTLDs
bootable, 28
installing, 32
High Sierra, 307
using, 284
installing, 307
using after installation, 286
ISO 9660,307
using at initial installation, 284
Rock Ridge, 307
buffers, boot display, 297
specifying IDE, 283
bus, cards, 295-296
Certificate of License and Authenticity
bus mouse, installation, 26
(COLA), 89, 91, 98
bus numbers, PCI, 508
cfg file, 260
buttons changing, installation serial number, 49
character, 148
onscreen, 123
551
character
553
Data
division drivers
hard disk, 333 See also device drivers
maximum size of, 334 bitpad,394
divvy(ADM), 333-334 checking configuration, 63
DIX cable, 506 list of installed, 260
dkinit(ADM), 328 mouse, 389
DMA network adapter, 483
channels configuring, 487
determining usage, 487 non-SCO,19
hardware problems, 62 vendor-supplied, 368
network adapters, 503 DTE. See Data Terminal Equipment
tape drive conflict, 350, 351 DTFS,l71
limitations, 283 DTR. See Data Terminal Ready
DNS duplex, 432
and virtual domain name, 478 dynamic file (scosession), 206
caching, 463
documentation
manuals,4,12 E
online, 4, 12
echo problems
your suggestions, 9
modem, 427
domain name, TCP lIP, 516 terminal, fixing, 448
Domain Name Service. See DNS
echoe parameter, 439
DOS
editing
accessing hardware, 62 command line, 140, 141
adding devices for a second disk, 114
vi, 160
and SCO systems, 101
EDITOR environment variable, 150
booting from a floppy disk, 108
editors, changing, 150
debug format command, 64
education, 15
defining device names, 112
EGA adapter, 56
devices, 114
EIDE, root disk, 340
does not work, 60
EIDE CD-ROM, 307
files, managing, 111
80387 math coprocessor, 299
filesystems, mounting, 113
EISA
hard disk devices, 109
adapters, configuring, 486,490
installing UNIX partition, 109 configuration disk, 297
mounting, 113 eisa(ADM), 182
partitions, 60, 63, 64
installing, 310
booting, 107 slot(ADM), 182
creating and formatting, 102
electronic mail, 129
removing, 111
e-mail,463
removing from hard disk, 111
configuring, 479
starting, 106 Netscape, 470
utilities, 111-113
using, 129
with two hard disks, 110
emergency boot floppy disk set, 185
doscmd( C), 111
adding files, 84
DOS-Debug, 104
creating, 35, 81
double-clicking, 123
reading backups, 84
dragging and dropping, 123 restoring root filesystem, 250
drive A:, using with doscmd(C), 112 restoring system files, 188-190, 192-195
testing, 84
555
enab/e(C)
557
fixmog
559
HUP
561
1808859-1
J L
jumper settings LAN (Local Area Network), 120,484
bus card, 296 planning, 163
tape drives, 353, 354 segment number
IPX!SPX,519
LAN Manager
K Client
configuring, 524
kernel, 61
transport connections, 524
backing up, 197
LANG environment variable, 200, 208
bitpad driver, 394
languages, specifying, 221, 223
booting from alternate kernel files, 189
Idsysdump(ADM), 262
branding, 49
License Manager, 87, 88
environment, 192
troubleshooting, 93-99
fails to boot, 32, 184
License Policy Manager Daemon
initialization, 539
(ifocpmd) was unable to start, 94
keyboard lockup patch, 197
licenses
mouse driver, 389
parameters
See also License Manager
additional, 13
current values, 260
additional users, 90
tuning, 287
privileges, 266 Certificate of License and Authenticity
(COLA), 98
relinking, 286, 290, 395
checking expiration, 95
startup letters, 539
CPUs,90
unix. safe, 32
expired, 94
Kernel: i/o bufs, message, 195
in use, displaying, 93
keyboards
License Code, 13,89
console, 197
License Data, 13, 89
end input, 141
License Number, 13, 89
installing mouse, 388
no user licenses found, 95,98
interrupt vectors, 504
not accepted, 93
lockup, 195-197,267
out of streams, 99
setting, 226
policy manager problems, 96
substituting mouse movements, 393
policy manager terminated, 94
test with modem, 422
products, 87, 89
type, 197
Registration Key, 14, 91
UNIX keystrokes, 140
software, 72
XT, non-AT, 197
system not licensed error, 60
keystrokes, 140
terminology, 13
kill key, 140, 141
troubleshooting, 93-99
KILL signal, 155
kill(C), 161 unregistered software messages, 60
Licensing Policy Manager Daemon
killing SCOadmin process, 156
(ifor_pmd) has terminated, 94
line modes, setting in / etc / inittab, 371
563
mapsfr(M)
565
netstat(TC)
567
ppp
569
SeOadmin
571
sio
573
tapes
575
lusrlbinlswconfig
Windows
installing, partition, 102
removing
from hard disk, 111
windows
active, 124
closing, 124
opening, 124
parts of, 124
scrolling, 125
selecting, 124
wiring, modems, 407
worksheet
configuration, 65, 66
problem description, 65
x
X server, problems exiting, 205
X terminals, 61
configuring, 217, 218
running clients, 220
using scologin, 211, 217, 218
XDMCP, 211, 217, 218
X TOOLKIT ERROR message, 60
XO.hosts through X7.hosts files, 216
Xconfig file, 210
xdm, See scologin display manager
XDMCP, 211, 212, 217, 218
XENIX, partition, 107
Xerrors file, 210
xinit,203
xm_vtcld process, 156
XON/XOFF
handshaking, 432
printer, 398
xrdb client, using, 207
xrdbcomp, 205
Xreset file, 201, 202
Xresources file, 210
Xsco
requesting scologin with XDMCP, 212
XDMCP options, 212
Xservers file, 210, 215
managing multiple displays, 214
Xsession file, 201
Xstartup file, 201
XT console keyboard, 197
577
XT
II~I~I~I~~~~IIIII~II~I~I~~~I~I
AU20017P003
2001 PAT 0987654321